Cargando…

Cybercrime investigators handbook /

Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and caus...

Descripción completa

Detalles Bibliográficos
Autor principal: Edwards, Graeme
Autor Corporativo: Gildan Media
Otros Autores: Bonnem, Curt (Narrador)
Formato: Electrónico Audiom
Idioma:Inglés
Publicado: New York : Gildan Audio, Â2019.
Edición:Unabridged.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cim a2200000Ma 4500
001 OR_on1121000392
003 OCoLC
005 20231017213018.0
006 m o h
007 sz zunnnnnuneu
007 cr nna|||uuuua
008 121004s2019 nyunnnn o z n eng d
040 |a RECBC  |b eng  |e pn  |c RECBC  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO 
020 |a 9781469075228 
020 |a 1469075229 
028 0 2 |a Z100154033  |b Recorded Books 
035 |a (OCoLC)1121000392 
049 |a UAMI 
100 1 |a Edwards, Graeme. 
245 1 0 |a Cybercrime investigators handbook /  |c Graeme Edwards. 
250 |a Unabridged. 
260 |a New York :  |b Gildan Audio,  |c Â2019. 
300 |a 1 online resource 
336 |a spoken word  |b spw  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Downloadable audio file. 
511 0 |a Narrated by Curt Bonnem. 
520 |a Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. They can cause immense harm to individuals or businesses online and make large sums of money-safe in the knowledge that the victim will rarely report the matter to the police. For those tasked with probing such crimes in the field, information on investigative methodology is scarce. While there are high-quality manuals for conducting digital examinations on a device or network that has been hacked, the Cybercrime Investigators Handbook is the first guide on how to commence an investigation from the location the offence occurred and collect the evidence necessary to locate and prosecute the offender. This valuable contribution to the field teaches listeners to locate, lawfully seize, preserve, examine, interpret, and manage the technical evidence that is vital for effective cybercrime investigation. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computers. 
650 0 |a Electronic digital computers. 
650 6 |a Ordinateurs. 
650 7 |a computers.  |2 aat 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Electronic digital computers  |2 fast 
650 7 |a Computers  |2 fast 
655 4 |a Downloadable audio books. 
655 7 |a Audiobooks  |2 fast 
655 7 |a Audiobooks.  |2 lcgft 
655 7 |a Livres audio.  |2 rvmgf 
700 1 |a Bonnem, Curt.  |4 nrt 
710 2 |a Gildan Media. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781469075228/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Recorded Books, LLC  |b RECC  |n rbdZ100154033 
994 |a 92  |b IZTAP