Computer and Intrusion ForensicsAnnotation A comprehensive and broad introduction to computer and intrusion forensics, covering the areas of law enforcement, national security and corporate fraud, this practical book helps professionals understand case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, and machine learning. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
V | 1 |
VII | 4 |
VIII | 6 |
IX | 12 |
X | 14 |
XI | 21 |
XII | 23 |
XIII | 27 |
LXXVIII | 190 |
LXXIX | 191 |
LXXX | 200 |
LXXXI | 204 |
LXXXII | 205 |
LXXXIII | 206 |
LXXXIV | 207 |
LXXXV | 209 |
XIV | 29 |
XV | 31 |
XVI | 32 |
XVII | 35 |
XVIII | 37 |
XIX | 39 |
XX | 41 |
XXII | 42 |
XXIII | 44 |
XXIV | 46 |
XXV | 49 |
XXVI | 57 |
XXVII | 59 |
XXVIII | 61 |
XXIX | 63 |
XXX | 67 |
XXXI | 69 |
XXXII | 72 |
XXXIII | 76 |
XXXIV | 77 |
XXXV | 86 |
XXXVI | 90 |
XXXVII | 94 |
XXXVIII | 98 |
XXXIX | 103 |
XL | 104 |
XLI | 113 |
XLIII | 117 |
XLIV | 121 |
XLV | 123 |
XLVII | 128 |
XLVIII | 133 |
L | 143 |
LI | 146 |
LII | 147 |
LIV | 149 |
LV | 152 |
LVI | 153 |
LVII | 154 |
LVIII | 159 |
LIX | 160 |
LX | 163 |
LXI | 164 |
LXIII | 165 |
LXIV | 167 |
LXV | 168 |
LXVI | 169 |
LXVII | 175 |
LXIX | 176 |
LXX | 177 |
LXXI | 178 |
LXXII | 180 |
LXXIII | 183 |
LXXIV | 184 |
LXXV | 187 |
LXXVI | 188 |
LXXVII | 189 |
LXXXVI | 210 |
LXXXVII | 211 |
LXXXVIII | 212 |
LXXXIX | 214 |
XC | 215 |
XCI | 216 |
XCII | 217 |
XCIV | 218 |
XCV | 219 |
XCVI | 221 |
XCVII | 223 |
C | 225 |
CI | 226 |
CII | 229 |
CIII | 230 |
CIV | 231 |
CV | 232 |
CVI | 236 |
CVIII | 237 |
CIX | 239 |
CX | 242 |
CXI | 244 |
CXIII | 248 |
CXIV | 253 |
CXV | 257 |
CXVII | 264 |
CXVIII | 267 |
CXIX | 274 |
CXX | 276 |
CXXI | 278 |
CXXII | 280 |
CXXIII | 285 |
CXXIV | 288 |
CXXV | 295 |
CXXVI | 303 |
CXXVII | 306 |
CXXVIII | 308 |
CXXIX | 310 |
CXXX | 312 |
CXXXI | 319 |
CXXXII | 323 |
CXXXIII | 327 |
CXXXIV | 331 |
CXXXV | 335 |
CXXXVI | 339 |
CXXXVII | 340 |
CXXXVIII | 343 |
CXXXIX | 345 |
CXL | 349 |
CXLI | 355 |
CXLII | 360 |
CXLIII | 364 |
CXLIV | 369 |
CXLV | 379 |
383 | |
Other editions - View all
Common terms and phrases
activity allows analysis application areas Association attack attributes Audit behavior Chapter cluster communications computer crime computer forensics contained copy court crime criminal described detailed detection developed discussed disk document duplicate e-mail electronic encryption evidence examination example extraction FF FF FF Figure fraud fraudulent given host identify important integrity International Internet intrusion investigation involves issues known law enforcement logs means Microsoft monitoring nature objects operating organization original packet particular patterns person possible potential present protection provides recent records referred relationships relevant requirements rules sector servers signature specific standard techniques typically United utilities visited Windows