Amazon cover image
Image from Amazon.com

System Forensics, Investigation, and Response

By: Material type: TextTextSeries: Information Systems Security & Assurance SeriesPublication details: Burlington Jones& Bartlett Learning 2014Edition: 3rd EdDescription: xvii, 335 pagesISBN:
  • 9781284121841
Subject(s): DDC classification:
  • 005.8 EAS/S
Contents:
Introduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.
List(s) this item appears in: New Arrivals IIIT Kottayam Library
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Reference Reference IIIT Kottayam Central Library Reference 005.8 EAS/S (Browse shelf(Opens below)) Not For Loan 2233
Books Books IIIT Kottayam Central Library General Stacks 005.8 EAS/S (Browse shelf(Opens below)) Available 2234
Books Books IIIT Kottayam Central Library General Stacks 005.8 EAS/S (Browse shelf(Opens below)) Available 2235
Books Books IIIT Kottayam Central Library General Stacks 005.8 EAS/S (Browse shelf(Opens below)) Available 2236
Books Books IIIT Kottayam Central Library General Stacks 005.8 EAS/S (Browse shelf(Opens below)) Available 2237
Total holds: 0

Revised edition of the author's System forensics, investigation, and response, c2014.

Includes bibliographical references and index.

Introduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.

There are no comments on this title.

to post a comment.
IIIT Kottayam Logo       © IIIT Kottayam 2023. All rights reserved.