Computer forensics principles and practices/
Saved in:
| Main Author: | Volonino, Linda |
|---|---|
| Other Authors: | Anzaldua, Reynaldo, Godwin, Jana |
| Format: | Book |
| Language: | English |
| Published: |
Upper Saddle River,N.J.:
Pearson/Prentice Hall,
2007
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA76.9.A25 .V59145 2007 |
Similar Items
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012)
by: Malin, Cameron H.
Published: (2012)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020)
by: Nelson, Bill, et al.
Published: (2020)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2019)
by: Nelson, Bill, et al.
Published: (2019)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
Forensic examination of windows-supported file systems
by: Elrick, Doug
Published: (2016)
by: Elrick, Doug
Published: (2016)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
Computer forensics and digital investigation with Encase Forensic v7
by: Widup, Suzanne
Published: (2014)
by: Widup, Suzanne
Published: (2014)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
Forensic discovery
by: Farmer
Published: (2005)
by: Farmer
Published: (2005)
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016)
by: Carvey, Harlan
Published: (2016)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014)
by: Ligh, Michael Hale, et al.
Published: (2014)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Computer security
by: Gollman
Published: (2006)
by: Gollman
Published: (2006)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
Digital forensics
Published: (2018)
Published: (2018)
Introduction to computer security
by: Bishop, Matt (Matthew A.)
Published: (2005)
by: Bishop, Matt (Matthew A.)
Published: (2005)
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
The computer incident response planning handbook executable plans for protecting information at risk
by: McCarthy, N.K
Published: (2012)
by: McCarthy, N.K
Published: (2012)
Security in computing systems challenges, approaches and solutions
by: Biskup ,J. (Joachim)
Published: (2009)
by: Biskup ,J. (Joachim)
Published: (2009)
Computer system security basic concepts and solved exercises
by: Avoine
Published: (2007)
by: Avoine
Published: (2007)
Trust and security in collaborative computing
by: Zou, Xukai, 1963-
Published: (2008)
by: Zou, Xukai, 1963-
Published: (2008)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2012)
by: Sammons, John
Published: (2012)
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Fundamentals of computer security
by: Pieprzyk, Josef 1949-
Published: (2003)
by: Pieprzyk, Josef 1949-
Published: (2003)
Similar Items
-
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009) -
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012) -
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010) -
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020) -
Guide to computer forensics and investigations
Published: (2008)


