Author: John R. Vacca
Edition: 1st
Binding: Paperback
ISBN: 1584500182
Publisher: Charles River Media
Features:
Edition: 1st
Binding: Paperback
ISBN: 1584500182
Publisher: Charles River Media
Features:
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Terrorist attacks are no longer relegated to airports and federal buildings. Search and download computer ebooks Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series) for free.
Categories: Computer crimes->Investigation->Handbooks, manuals, etc, Forensic sciences->Computer forensics, Internet * Security. Contributors: Warren G. Kruse II - Author. Format: NOOK Book. Download Computer Forensics computer ebooks
Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book/CD package provides a complete overview of computer forensics from its definition to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminal. The book focuses on "solving the crime" rather than information security. KEY FEATURES * Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks *
Computer Forensics For Dummies
Categories: Forensic sciences->Computer forensics. Contributors: Linda Volonino - Author. Format: Paperback
Categories: Forensic sciences->Computer forensics. Contributors: EC-Council - Author. Format: Paperback
Categories: Computer crimes, Forensic sciences->Computer forensics, Computer networks->Security measures. Contributors: John R Vacca - Author. Format: Paperback
Categories: Forensic sciences->Computer forensics. Contributors: Linda Volonino - Author. Format: Paperback
Computer Forensics Free
KEY FEATURES * Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks *