Computer forensics investigating data and image files
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecti...
Saved in:
| Corporate Author: | EC-Council Press |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boston, MA
Cengage Learning
2017
|
| Edition: | Second edition |
| Series: | Computer forensics
book 3 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Investigating file and operating systems, wireless networks, and storage
Published: (2017)
Published: (2017)
EnCase computer forensics the official EnCE : EnCase certified examiner study guide
by: Bunting, Steve
Published: (2012)
by: Bunting, Steve
Published: (2012)
CEH Certified Ethical Hacker practice exams
by: Walker, Matthew
Published: (2014)
by: Walker, Matthew
Published: (2014)
CEH Certified Ethical Hacker exam guide exam guide
by: Walker, Matthew
Published: (2014)
by: Walker, Matthew
Published: (2014)
The CEH prep guide the comprehensive guide to certified ethical hacking
by: Krutz, Ronald L. 1938
Published: (2008)
by: Krutz, Ronald L. 1938
Published: (2008)
CEH certified ethical hacker all-in-one exam guide
by: Walker, Matthew
Published: (2022)
by: Walker, Matthew
Published: (2022)
CEH v9 certified ethical hacker version 9 : practice tests
by: Blockmon, Raymond
Published: (2016)
by: Blockmon, Raymond
Published: (2016)
CEH v9 Certified ethical hacker version 9 : study guide
by: Oriyano, Sean-Philip
Published: (2016)
by: Oriyano, Sean-Philip
Published: (2016)
Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard
by: Shavers, Brett
Published: (2013)
by: Shavers, Brett
Published: (2013)
Computer forensics and digital investigation with Encase Forensic v7
by: Widup, Suzanne
Published: (2014)
by: Widup, Suzanne
Published: (2014)
A Practical Guide to Digital Forensics Investigations /
by: Hayes, Darren Richard
Published: (2021)
by: Hayes, Darren Richard
Published: (2021)
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
CCSP (ISC)2 certified cloud security professional official study guide
by: O'Hara, Brian T., et al.
Published: (2017)
by: O'Hara, Brian T., et al.
Published: (2017)
CompTIA Security + (Exam SY0-401)
by: Taylor, Pamela J., et al.
Published: (2014)
by: Taylor, Pamela J., et al.
Published: (2014)
Pass your day skipper
by: Fairhall, David
Published: (2008)
by: Fairhall, David
Published: (2008)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
Aircraft digital electronic and computer systems principles, operation and maintenance
by: Tooley, Michael H.
Published: (2007)
by: Tooley, Michael H.
Published: (2007)
Student skills tutor's handbook
by: Drew
Published: (1997)
by: Drew
Published: (1997)
Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard
by: Shavers, Brett
Published: (2013)
by: Shavers, Brett
Published: (2013)
Cyber crime and cyber terrorism investigator's handbook
Published: (2014)
Published: (2014)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2012)
by: Sammons, John
Published: (2012)
Network fundamentals CCNA exploration labs and study guide
Published: (2008)
Published: (2008)
CIT Cisco internetwork troubleshooting
by: Thomas M
Published: (2000)
by: Thomas M
Published: (2000)
Certified Ethical Hacker (CEH) Foundation Guide/
by: Rahalkar, Sagar Ajay
Published: (2016)
by: Rahalkar, Sagar Ajay
Published: (2016)
Digital Forensics, Investigation, and Response /
by: Easttom, Chuck
Published: (2022)
by: Easttom, Chuck
Published: (2022)
AWS certified advanced networking official study guide specialty exam
by: Chauhan, Sidhartha
Published: (2018)
by: Chauhan, Sidhartha
Published: (2018)
CISSP cert guide
by: McMillan, Troy
Published: (2014)
by: McMillan, Troy
Published: (2014)
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Microsoft windows 2000 networking lab manual
by: Craswell
Published: (2002)
by: Craswell
Published: (2002)
Official certified ethical hacker review guide, version 7.1
by: DeFino, Steven
Published: (2013)
by: DeFino, Steven
Published: (2013)
(ISC)2 CISSP official study guide
by: Chapple, Mike, et al.
Published: (2018)
by: Chapple, Mike, et al.
Published: (2018)
MCSA guide to administering Microsoft Windows Server 2012/R2, Exam 70-411
by: Tomsho, Greg
Published: (2015)
by: Tomsho, Greg
Published: (2015)
CCSP official (ISC)2 practice tests
by: Malisow, Ben
Published: (2018)
by: Malisow, Ben
Published: (2018)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
How to pass the QTS numeracy skills test essential mental and general arithmetic and statistics practice for the qualified teacher status skills test /
by: Tyreman, C. J.
Published: (2009)
by: Tyreman, C. J.
Published: (2009)
Cardiology
by: Al-Obaidi, Mohamed K
Published: (2004)
by: Al-Obaidi, Mohamed K
Published: (2004)
Studying physics
by: Sands, David 1960-
Published: (2004)
by: Sands, David 1960-
Published: (2004)
Flight test tips & tales from the eye of the examiner
by: Fried
Published: (1996)
by: Fried
Published: (1996)
Similar Items
-
Investigating file and operating systems, wireless networks, and storage
Published: (2017) -
EnCase computer forensics the official EnCE : EnCase certified examiner study guide
by: Bunting, Steve
Published: (2012) -
CEH Certified Ethical Hacker practice exams
by: Walker, Matthew
Published: (2014) -
CEH Certified Ethical Hacker exam guide exam guide
by: Walker, Matthew
Published: (2014) -
The CEH prep guide the comprehensive guide to certified ethical hacking
by: Krutz, Ronald L. 1938
Published: (2008)


