Computer and Intrusion ForensicsA comprehensive and broad introduction to computer and intrusion forensics, designed to help you master the tools, techniques and underlying concepts. It presents case studies from around the world, and covers the areas of law enforcement, national security and the private sector. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
LXXVIII | 190 |
LXXIX | 191 |
LXXX | 200 |
LXXXI | 204 |
LXXXII | 205 |
LXXXIII | 206 |
LXXXIV | 207 |
LXXXV | 209 |
| 29 | |
| 31 | |
| 32 | |
| 35 | |
| 37 | |
| 39 | |
| 41 | |
| 42 | |
| 44 | |
| 46 | |
| 49 | |
| 57 | |
| 59 | |
| 61 | |
| 63 | |
| 67 | |
| 69 | |
| 72 | |
| 76 | |
| 77 | |
| 86 | |
| 90 | |
| 94 | |
| 98 | |
XXXIX | 103 |
XL | 104 |
XLI | 113 |
XLIII | 117 |
XLIV | 121 |
XLV | 123 |
XLVII | 128 |
XLIX | 133 |
LI | 143 |
LII | 146 |
LIII | 147 |
LV | 149 |
LVI | 152 |
LVII | 153 |
LVIII | 154 |
LIX | 159 |
LX | 160 |
LXI | 163 |
LXII | 164 |
LXIV | 165 |
LXV | 167 |
LXVI | 168 |
LXVII | 169 |
LXVIII | 175 |
LXIX | 176 |
LXX | 177 |
LXXI | 178 |
LXXII | 180 |
LXXIII | 183 |
LXXIV | 184 |
LXXV | 187 |
LXXVI | 188 |
LXXVII | 189 |
LXXXVI | 210 |
LXXXVII | 211 |
LXXXVIII | 212 |
LXXXIX | 214 |
XC | 215 |
XCI | 216 |
XCII | 217 |
XCIV | 218 |
XCV | 219 |
XCVI | 221 |
XCVII | 223 |
XCIX | 225 |
C | 226 |
CI | 229 |
CII | 230 |
CIII | 231 |
CIV | 232 |
CV | 236 |
CVII | 237 |
CVIII | 239 |
CIX | 242 |
CX | 244 |
CXII | 248 |
CXIII | 253 |
CXIV | 257 |
CXV | 264 |
CXVI | 267 |
CXVII | 274 |
CXVIII | 276 |
CXIX | 278 |
CXX | 280 |
CXXI | 285 |
CXXIII | 288 |
CXXIV | 295 |
CXXV | 303 |
CXXVII | 306 |
CXXVIII | 308 |
CXXIX | 310 |
CXXX | 312 |
CXXXI | 319 |
CXXXII | 323 |
CXXXIII | 327 |
CXXXIV | 331 |
CXXXV | 335 |
CXXXVI | 339 |
CXXXVII | 340 |
CXXXVIII | 343 |
CXXXIX | 345 |
CXL | 349 |
CXLI | 355 |
CXLII | 360 |
CXLIII | 364 |
CXLIV | 369 |
CXLV | 379 |
CXLVI | 383 |
Other editions - View all
Common terms and phrases
algorithms analyze application association rules attack attributes Audit Benford's Law Chapter cluster communications computer and intrusion computer crime computer evidence computer forensic examiner computer forensic specialist computer forensics computer networks computer security computer systems court criminal data mining database dataset deleted developed digital evidence disk imaging document duplicate e-mail electronic evidence encryption event logs example extraction FF FF FF file system forensic analysis forensic investigation forensic process forensic tools fraud detection fraudulent activity hardware header host identify ILook integrity International Internet intrusion forensics law enforcement link analysis Linux Microsoft Windows monitoring objects operating system packet password potential Protocol provides records regression analysis relationships relevant requirements retrieval rootkit Section sector servers signature steganography techniques time-lining timestamps UNIX utilities virus visited April 2002 visited July 2002 visited March 2002 vulnerabilities
