Search Results - "Computer forensics"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 14
- Computer crimes 10
- Security measures 10
- Computer networks 8
- Forensic sciences 8
- Data protection 6
- Investigation 6
- Information storage and retrieval systems 4
- COMPUTERS / Security / General 2
- Certification 2
- Corporations 2
- Corrupt practices 2
- Electronic data processing personnel 2
- Examinations 2
- Fraud investigation 2
- Investments 2
- Law and legislation 2
-
1
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Computer forensics for dummies
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Computer Forensics jumpstart
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
-
6
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives /
Published 2013Table of Contents: “…Foreword -- Preface -- This book's setup -- Acknowledgments -- Introduction -- The glue -- A primer on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
-
8
Computer Forensics jumpstart
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
-
10
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives /
Published 2013Table of Contents: “…Foreword -- Preface -- This book's setup -- Acknowledgments -- Introduction -- The glue -- A primer on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
-
12
Computer forensics for dummies
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Privacy protection and computer forensics
Published 2004“…Computer forensics and privacy.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Privacy protection and computer forensics
Published 2004“…Computer forensics and privacy.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Legal issues in information security /
Published 2015Table of Contents: “…Security and privacy in organizations -- Information security governance -- Risk analysis, incident response, and contingency planning -- Computer forensics and investigations.…”
Book -
16
Legal issues in information security /
Published 2015Table of Contents: “…Security and privacy in organizations -- Information security governance -- Risk analysis, incident response, and contingency planning -- Computer forensics and investigations.…”
Book -
17
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
18
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book