Computer forensics for dummies
Сохранить в:
Главный автор: | Volonino, Linda |
---|---|
Соавтор: | ebrary, Inc |
Другие авторы: | Anzaldua, Reynaldo |
Формат: | Электронный ресурс eКнига |
Язык: | английский |
Опубликовано: |
Hoboken, N.J. : Chichester :
Wiley ; John Wiley [distributor],
2008.
|
Серии: | --For dummies.
|
Предметы: | |
Online-ссылка: | An electronic book accessible through the World Wide Web; click to view |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives /
по: Laykin, Erik
Опубликовано: (2013)
по: Laykin, Erik
Опубликовано: (2013)
Computer forensics an essential guide for accountants, lawyers, and managers /
по: Sheetz, Michael
Опубликовано: (2007)
по: Sheetz, Michael
Опубликовано: (2007)
Techno security's guide to e-discovery and digital forensics
по: Wiles, Jack
Опубликовано: (2007)
по: Wiles, Jack
Опубликовано: (2007)
Windows forensic analysis DVD toolkit, /
по: Carvey, Harlan A.
Опубликовано: (2007)
по: Carvey, Harlan A.
Опубликовано: (2007)
Mastering windows network forensics and investigation
Опубликовано: (2012)
Опубликовано: (2012)
The basics of digital forensics the primer for getting started in digital forensics /
по: Sammons, John
Опубликовано: (2012)
по: Sammons, John
Опубликовано: (2012)
Computer incident response and forensics team management : conducting a successful incident response /
по: Johnson, Leighton
Опубликовано: (2014)
по: Johnson, Leighton
Опубликовано: (2014)
Computer evidence collection & preservation /
по: Brown, Christopher L. T.
Опубликовано: (2006)
по: Brown, Christopher L. T.
Опубликовано: (2006)
CD and DVD forensics
по: Crowley, Paul
Опубликовано: (2007)
по: Crowley, Paul
Опубликовано: (2007)
Computer evidence collection and preservation /
по: Brown, Christopher L. T.
Опубликовано: (2010)
по: Brown, Christopher L. T.
Опубликовано: (2010)
Digital forensics processing and procedures : meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements /
по: Watson, David (David Lilburn)
Опубликовано: (2013)
по: Watson, David (David Lilburn)
Опубликовано: (2013)
Wildlife forensics methods and applications /
по: Huffman, Jane E.
Опубликовано: (2011)
по: Huffman, Jane E.
Опубликовано: (2011)
Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutors /
по: Reyes, Anthony
Опубликовано: (2007)
по: Reyes, Anthony
Опубликовано: (2007)
Investigating internet crimes : an introduction to solving crimes in cyberspace /
по: Shipley, Todd G.
Опубликовано: (2014)
по: Shipley, Todd G.
Опубликовано: (2014)
Cyber crime and cyber terrorism investigator's handbook /
Опубликовано: (2014)
Опубликовано: (2014)
Computer Forensics jumpstart
Опубликовано: (2011)
Опубликовано: (2011)
Search and seizure of digital evidence
по: Moore, Robert, 1976-
Опубликовано: (2005)
по: Moore, Robert, 1976-
Опубликовано: (2005)
The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals /
по: Schroeder, Steve
Опубликовано: (2012)
по: Schroeder, Steve
Опубликовано: (2012)
Wildlife DNA analysis applications in forensic science /
по: Linacre, Adrian
Опубликовано: (2013)
по: Linacre, Adrian
Опубликовано: (2013)
Investigating organised crime and war crimes : a pesonal account of a senior detective in Kosovo, Iraq and beyond. /
по: Nott, Anthony
Опубликовано: (2017)
по: Nott, Anthony
Опубликовано: (2017)
Digital transformations of illicit drug markets : reconfiguration and continuity /
по: Tzanetakis, Meropi, и др.
Опубликовано: (2023)
по: Tzanetakis, Meropi, и др.
Опубликовано: (2023)
Fighting computer crime : a new framework for protecting information /
по: Parker, Donn B.
Опубликовано: (1998)
по: Parker, Donn B.
Опубликовано: (1998)
Risk factors in computer-crime victimization
по: Choi, Kyung-shick, 1973-
Опубликовано: (2010)
по: Choi, Kyung-shick, 1973-
Опубликовано: (2010)
The official CHFI exam 312-49 study guide for computer hacking forensics investigators.
Опубликовано: (2007)
Опубликовано: (2007)
A guide to forensic accounting investigation /
по: Golden, Thomas W.
Опубликовано: (2011)
по: Golden, Thomas W.
Опубликовано: (2011)
Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios /
по: Carbone, Fernando
Опубликовано: (2014)
по: Carbone, Fernando
Опубликовано: (2014)
Forensic accounting and fraud investigation for non-experts
по: Silverstone, Howard
Опубликовано: (2012)
по: Silverstone, Howard
Опубликовано: (2012)
Android forensics investigation, analysis, and mobile security for Google Android /
по: Hoog, Andrew
Опубликовано: (2011)
по: Hoog, Andrew
Опубликовано: (2011)
Policing sexual assault
по: Gregory, Jeanne
Опубликовано: (2002)
по: Gregory, Jeanne
Опубликовано: (2002)
Forensic investigation of stolen-recovered and other crime-related vehicles
по: Stauffer, Eric, 1975-
Опубликовано: (2006)
по: Stauffer, Eric, 1975-
Опубликовано: (2006)
Encase computer forensics the official ENCE : Encase certified examiner study guide /
по: Bunting, Steve V.
Опубликовано: (2012)
по: Bunting, Steve V.
Опубликовано: (2012)
License plate readers for law enforcement : opportunities and obstacles /
по: Gierlack, Keith
Опубликовано: (2014)
по: Gierlack, Keith
Опубликовано: (2014)
Hacking for dummies
по: Beaver, Kevin
Опубликовано: (2013)
по: Beaver, Kevin
Опубликовано: (2013)
Privacy protection and computer forensics
по: Caloyannides, Michael A.
Опубликовано: (2004)
по: Caloyannides, Michael A.
Опубликовано: (2004)
Zen and the art of information security
по: Winkler, Ira
Опубликовано: (2007)
по: Winkler, Ira
Опубликовано: (2007)
Software piracy exposed
по: Honick, Ron
Опубликовано: (2005)
по: Honick, Ron
Опубликовано: (2005)
Web application defender's cookbook battling hackers and protecting users /
по: Barnett, Ryan C.
Опубликовано: (2013)
по: Barnett, Ryan C.
Опубликовано: (2013)
Insider threat protecting the enterprise from sabotage, spying, and theft /
по: Cole, Eric
Опубликовано: (2006)
по: Cole, Eric
Опубликовано: (2006)
Guide to computer network security /
по: Kizza, Joseph Migga
Опубликовано: (2017)
по: Kizza, Joseph Migga
Опубликовано: (2017)
Invisible threats financial and information technology crimes and national security /
Опубликовано: (2006)
Опубликовано: (2006)
Схожие документы
-
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives /
по: Laykin, Erik
Опубликовано: (2013) -
Computer forensics an essential guide for accountants, lawyers, and managers /
по: Sheetz, Michael
Опубликовано: (2007) -
Techno security's guide to e-discovery and digital forensics
по: Wiles, Jack
Опубликовано: (2007) -
Windows forensic analysis DVD toolkit, /
по: Carvey, Harlan A.
Опубликовано: (2007) -
Mastering windows network forensics and investigation
Опубликовано: (2012)