System Forensics, Investigation, and Response
Material type: TextSeries: Information Systems Security & Assurance SeriesPublication details: Burlington Jones& Bartlett Learning 2014Edition: 3rd EdDescription: xvii, 335 pagesISBN:- 9781284121841
- 005.8 EAS/S
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
Reference | IIIT Kottayam Central Library Reference | 005.8 EAS/S (Browse shelf(Opens below)) | Not For Loan | 2233 | |||
Books | IIIT Kottayam Central Library General Stacks | 005.8 EAS/S (Browse shelf(Opens below)) | Available | 2234 | |||
Books | IIIT Kottayam Central Library General Stacks | 005.8 EAS/S (Browse shelf(Opens below)) | Available | 2235 | |||
Books | IIIT Kottayam Central Library General Stacks | 005.8 EAS/S (Browse shelf(Opens below)) | Available | 2236 | |||
Books | IIIT Kottayam Central Library General Stacks | 005.8 EAS/S (Browse shelf(Opens below)) | Available | 2237 |
Browsing IIIT Kottayam Central Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
005.8 COE/E Expert Fraud Investigation : A Step-by-Step Guide | 005.8 COE/E Expert Fraud Investigation : A Step-by-Step Guide | 005.8 COE/E Expert Fraud Investigation : A Step-by-Step Guide | 005.8 EAS/S System Forensics, Investigation, and Response | 005.8 EAS/S System Forensics, Investigation, and Response | 005.8 EAS/S System Forensics, Investigation, and Response | 005.8 EAS/S System Forensics, Investigation, and Response |
Revised edition of the author's System forensics, investigation, and response, c2014.
Includes bibliographical references and index.
Introduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.
There are no comments on this title.