Investigating file and operating systems, wireless networks, and storage
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecti...
Saved in:
| Corporate Author: | International Council of E-Commerce Consultants |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boston, MA
Cengage Learning
2017
|
| Edition: | Second edition |
| Series: | Computer forensics
book 2 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computer forensics investigating data and image files
Published: (2017)
Published: (2017)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
EnCase computer forensics the official EnCE : EnCase certified examiner study guide
by: Bunting, Steve
Published: (2012)
by: Bunting, Steve
Published: (2012)
CompTIA Security + (Exam SY0-401)
by: Taylor, Pamela J., et al.
Published: (2014)
by: Taylor, Pamela J., et al.
Published: (2014)
Security+ guide to network security fundamentals
by: Ciampa, Mark D.
Published: (2012)
by: Ciampa, Mark D.
Published: (2012)
Security+ guide to network security fundamentals
by: Ciampa, Mark
Published: (2008)
by: Ciampa, Mark
Published: (2008)
The CEH prep guide the comprehensive guide to certified ethical hacking
by: Krutz, Ronald L. 1938
Published: (2008)
by: Krutz, Ronald L. 1938
Published: (2008)
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
CCSP (ISC)2 certified cloud security professional official study guide
by: O'Hara, Brian T., et al.
Published: (2017)
by: O'Hara, Brian T., et al.
Published: (2017)
Cybercrime investigations the comprehensive resource for everyone
by: Bandler, John, et al.
Published: (2020)
by: Bandler, John, et al.
Published: (2020)
Security t guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
Microsoft windows 2000 networking lab manual
by: Craswell
Published: (2002)
by: Craswell
Published: (2002)
Investigating internet crimes an introduction to solving crimes in cyberspace
by: Shipley, Todd G, et al.
Published: (2014)
by: Shipley, Todd G, et al.
Published: (2014)
Computer forensics and digital investigation with Encase Forensic v7
by: Widup, Suzanne
Published: (2014)
by: Widup, Suzanne
Published: (2014)
Network fundamentals CCNA exploration labs and study guide
Published: (2008)
Published: (2008)
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016)
by: Carvey, Harlan
Published: (2016)
Cyber crime and cyber terrorism investigator's handbook
Published: (2014)
Published: (2014)
(ISC)2 CISSP official study guide
by: Chapple, Mike, et al.
Published: (2018)
by: Chapple, Mike, et al.
Published: (2018)
Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard
by: Shavers, Brett
Published: (2013)
by: Shavers, Brett
Published: (2013)
Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard
by: Shavers, Brett
Published: (2013)
by: Shavers, Brett
Published: (2013)
Digital Forensics, Investigation, and Response /
by: Easttom, Chuck
Published: (2022)
by: Easttom, Chuck
Published: (2022)
Network+ guide to networks
by: Dean, Tamara
Published: (2013)
by: Dean, Tamara
Published: (2013)
CEH certified ethical hacker all-in-one exam guide
by: Walker, Matthew
Published: (2022)
by: Walker, Matthew
Published: (2022)
CCSP official (ISC)2 practice tests
by: Malisow, Ben
Published: (2018)
by: Malisow, Ben
Published: (2018)
CompTIA® network+ guide to networks
by: West, Jill, et al.
Published: (2016)
by: West, Jill, et al.
Published: (2016)
CompTIA Network+ guide to networks
by: Dean, Tamara
Published: (2019)
by: Dean, Tamara
Published: (2019)
CEH Certified Ethical Hacker practice exams
by: Walker, Matthew
Published: (2014)
by: Walker, Matthew
Published: (2014)
CEH Certified Ethical Hacker exam guide exam guide
by: Walker, Matthew
Published: (2014)
by: Walker, Matthew
Published: (2014)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
Mobile network forensics emerging research and opportunities
by: Sharevski, Filipo 1985
Published: (2019)
by: Sharevski, Filipo 1985
Published: (2019)
CISSP in 21 days boost your confidence and get the competitive edge you need to crack the exam in just 21 days!
by: Srinivasan, M. L.
Published: (2016)
by: Srinivasan, M. L.
Published: (2016)
The CompTIA Security + certification guide exam SYO-sp1 3E
by: Dubrawsky, Ido
Published: (2009)
by: Dubrawsky, Ido
Published: (2009)
Mike Meyers' CompTIA security+ certification passport
by: Meyers 1961-
Published: (2009)
by: Meyers 1961-
Published: (2009)
CISA Certified Information Systems Auditor : study guide
by: Cannon, David L. 1962-, et al.
Published: (2016)
by: Cannon, David L. 1962-, et al.
Published: (2016)
CCNA Cisco certified network associate study guide (exam 640-802)
by: Deal, Richard A.
Published: (2008)
by: Deal, Richard A.
Published: (2008)
CISSP cert guide
by: McMillan, Troy
Published: (2014)
by: McMillan, Troy
Published: (2014)
CompTIA security+ certification study guide (exam SYO-301)
by: Clarke, Glen E.
Published: (2012)
by: Clarke, Glen E.
Published: (2012)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
CCNA security study guide exam 210-260
by: McMillan, Troy
Published: (2018)
by: McMillan, Troy
Published: (2018)
Similar Items
-
Computer forensics investigating data and image files
Published: (2017) -
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024) -
Handbook of research on network forensics and analysis techniques
Published: (2018) -
EnCase computer forensics the official EnCE : EnCase certified examiner study guide
by: Bunting, Steve
Published: (2012) -
CompTIA Security + (Exam SY0-401)
by: Taylor, Pamela J., et al.
Published: (2014)


