System forensics, investigation, and response / Chuck Easttom.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781284121841
- HV8079.C65 E37 2019
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HV8079.C65 E37 2019 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000050316 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HV8079.C65 E37 2019 (إستعراض الرف(يفتح أدناه)) | C.2 | Library Use Only | داخل المكتبة فقط | 30020000050338 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
HV8079.C65 C95 2013 Cybercrime and cloud forensics : applications for investigation processes / | HV8079.C65 D545 2020 Digital forensic education : an experiential learning approach / | HV8079.C65 D545 2020 Digital forensic education : an experiential learning approach / | HV8079.C65 E37 2019 System forensics, investigation, and response / | HV8079.C65 E37 2019 System forensics, investigation, and response / | HV8079.C65 E39 2019 Cybercrime investigators handbook / | HV8079.C65 E39 2019 Cybercrime investigators handbook / |
Revised edition of the author's System forensics, investigation, and response, c2014.
Includes bibliographical references and index.
Introduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.