Search Results - "Computer forensics"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 2

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3
  4. 4

    Computer Forensics jumpstart

    Published 2011
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5
  6. 6

    Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives / by Laykin, Erik

    Published 2013
    Table of Contents: “…Foreword -- Preface -- This book's setup -- Acknowledgments -- Introduction -- The glue -- A primer on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7
  8. 8

    Computer Forensics jumpstart

    Published 2011
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9
  10. 10

    Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives / by Laykin, Erik

    Published 2013
    Table of Contents: “…Foreword -- Preface -- This book's setup -- Acknowledgments -- Introduction -- The glue -- A primer on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11
  12. 12
  13. 13

    Privacy protection and computer forensics by Caloyannides, Michael A.

    Published 2004
    “…Computer forensics and privacy.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    Privacy protection and computer forensics by Caloyannides, Michael A.

    Published 2004
    “…Computer forensics and privacy.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15

    Legal issues in information security / by Grama, Joanna Lyn

    Published 2015
    Table of Contents: “…Security and privacy in organizations -- Information security governance -- Risk analysis, incident response, and contingency planning -- Computer forensics and investigations.…”
    Book
  16. 16

    Legal issues in information security / by Grama, Joanna Lyn

    Published 2015
    Table of Contents: “…Security and privacy in organizations -- Information security governance -- Risk analysis, incident response, and contingency planning -- Computer forensics and investigations.…”
    Book
  17. 17

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  18. 18

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book