Scene of the cybercrime computer forensics
Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It give...
Saved in:
| Format: | Book |
|---|---|
| Language: | English |
| Published: |
United Kingdom, UK
Koros Press Limited
2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Critical infrastructure protection from cybersecurity to cyber resilience
Published: (2021)
Published: (2021)
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Cybersecurity for beginners
by: Meeuwisse, Raef
Published: (2017)
by: Meeuwisse, Raef
Published: (2017)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
Deterrence in the cyberspace the quest for red-line against cyber threats
by: Chan, Yongxue Duncan
by: Chan, Yongxue Duncan
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014)
by: Ligh, Michael Hale, et al.
Published: (2014)
Conflict in cyber space theoretical, strategic and legal perspectives
Published: (2016)
Published: (2016)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020)
by: Nelson, Bill, et al.
Published: (2020)
Forensic examination of windows-supported file systems
by: Elrick, Doug
Published: (2016)
by: Elrick, Doug
Published: (2016)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Cybersecurity Ops with bash attack, defend, and analyze from the command line
by: Troncone, Paul, et al.
Published: (2019)
by: Troncone, Paul, et al.
Published: (2019)
Ethics and cyber warfare the quest for responsible security in the age of digital warfare
by: Lucas, George R.
Published: (2017)
by: Lucas, George R.
Published: (2017)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Cybercrime and society
by: Yar, Majid
Published: (2013)
by: Yar, Majid
Published: (2013)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
Collaborative cyber threat intelligence detecting and responding to advanced cyber attacks at the national level
Published: (2018)
Published: (2018)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Cybersecurity wellness index evaluation framework for critical organisations
by: Husin Jazri
Published: (2019)
by: Husin Jazri
Published: (2019)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Computer forensics principles and practices/
by: Volonino, Linda
Published: (2007)
by: Volonino, Linda
Published: (2007)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2019)
by: Nelson, Bill, et al.
Published: (2019)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Encyclopedia of cybercrime
Published: (2009)
Published: (2009)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
Undang-undang Siber Malaysia Akta Tandatangan Digital 1997 (Akta 562) & Peraturan-peraturan dan Perintah, Akta Jenayah Komputer 1997 (Akta 563), Akta Teleperubatan 1997 (Akta 564), hingga 10 Dis 2002
Published: (2002)
Published: (2002)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Similar Items
-
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015) -
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018) -
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014) -
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019) -
Critical infrastructure protection from cybersecurity to cyber resilience
Published: (2021)


