Computer crimes - Investigation.
Overview
Works: | 55 works in 33 publications in 33 languages |
---|
Titles
Cyber crime investigationsbridging the gaps between security professionals, law enforcement, and prosecutors /
by:
(Electronic resources)
Cisco router and switch forensicsinvestigating and analyzing malicious network activity /
by:
(Electronic resources)
Digital forensics for network, Internet, and cloud computinga forensic evidence guide for moving targets and data /
by:
(Electronic resources)
Virtualization and forensicsa digital forensic investigator's guide to virtual environments /
by:
(Electronic resources)
Android forensics :investigation, analysis, and mobile security for Google Android /
by:
(Language materials, printed)
Android forensicsinvestigation, analysis, and mobile security for Google Android /
by:
(Electronic resources)
The basics of digital forensicsthe primer for getting started in digital forensics /
by:
(Electronic resources)
Computational intelligence in digital forensicsforensic investigation and applications /
by:
(Electronic resources)
Investigating internet crimesan introduction to solving crimes in cyberspace /
by:
(Electronic resources)
Digital forensics processing and proceduresmeeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements /
by:
(Electronic resources)
Cyber security, cyber crime and cyber forensicsapplications and perspectives /
by:
(Electronic resources)
Investigative computer forensicsthe practical guide for lawyers, accountants, investigators, and business executives /
by:
(Electronic resources)
Multimedia forensics and securityfoundations, innovations, and applications /
by:
(Electronic resources)
Implementing digital forensic readinessfrom reactive to proactive process /
by:
(Electronic resources)
What every engineer should know about cyber security and digital forensics
by:
(Electronic resources)
Big digital forensic data.Volume 1,Data reduction framework and selective imaging
by:
(Electronic resources)
Fundamentals of digital forensicstheory, methods, and real-life applications /
by:
(Electronic resources)
Deviance in Social Media and Social Cyber ForensicsUncovering Hidden Relations Using Open Source Information (OSINF) /
by:
(Electronic resources)
Executing Windows command line investigations :while ensuring evidentiary integrity /
by:
(Electronic resources)
Contemporary digital forensic investigations of cloud and mobile applications /
by:
(Electronic resources)
Seeking the truth from mobile evidence :basic fundamentals, intermediate and advanced overview of current mobile forensic investigations /
by:
(Electronic resources)
Deception in the digital age :exploiting and defending human targets through computer-mediated communications /
by:
(Electronic resources)
Computer incident response and forensics team managementconducting a successful incident response /
by:
(Electronic resources)
Practical cyber forensicsan incident-based approach to forensic investigations /
by:
(Electronic resources)
The basics of digital forensicsthe primer for getting started in digital forensics /
by:
(Electronic resources)
Forensic investigations and risk management in mobile and wireless communications
by:
(Electronic resources)
Hunting cyber criminalsa hacker's guide to online intelligence gathering tools and techniques /
by:
(Electronic resources)
Show more
Fewer
Subjects