CyberForensics Understanding Information Security Investigations /
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the dec...
Cote: | Libro Electrónico |
---|---|
Collectivité auteur: | |
Autres auteurs: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Totowa, NJ :
Humana Press : Imprint: Humana,
2010.
|
Édition: | 1st ed. 2010. |
Collection: | Springer's Forensic Laboratory Science Series,
|
Sujets: | |
Accès en ligne: | Texto Completo |
Table des matières:
- The Complex World of Corporate CyberForensics Investigations
- Investigating Large-Scale Data Breach Cases
- Insider Threat Investigations
- Accounting Forensics
- Analyzing Malicious Software
- Network Packet Forensics
- RAM and File Systems Investigations
- One Picture is Worth a Million Bytes
- Cybercrime and Law Enforcement Cooperation
- Technology Malpractice.