Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. This title teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. It includes chapters dedicated to networked Windows, and Unix, and Macintosh computers.
Includes companions for any digital and computer forensic investigator and analyst. This title is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. It addresses malware artifact discovery and extraction from a live Linux system.
A collection that details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. It provides guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation.
Covers the field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. This book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.