Guide to computer forensics and investigations
| Main Authors: | Nelson, Bill (Author), Phillips, Amelia (Author), Steuart, Chris (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Edition: | Sixth edition |
| Subjects: |
Similar Items
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010)
by: Nelson, Bill, et al.
Published: (2010)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
by: Laykin, Erik
Published: (2013)
by: Laykin, Erik
Published: (2013)
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)
by: Philipp, Aaron, et al.
Published: (2010)
Computer forensics jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
Malware forensics investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008)
by: Aquilina, James M., et al.
Published: (2008)
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2015)
by: Sammons, John
Published: (2015)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri, et al.
Published: (2012)
by: Davidoff, Sherri, et al.
Published: (2012)
Digital forensics for handheld devices
by: Doherty, Eamon P.
Published: (2013)
by: Doherty, Eamon P.
Published: (2013)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
Unix and Linux forensic analysis DVD toolkit
by: Pogue, Chris, et al.
Published: (2008)
by: Pogue, Chris, et al.
Published: (2008)
Computer forensics cybercriminals, laws, and evidence
by: Maras, Marie-Helen 1979-
Published: (2014)
by: Maras, Marie-Helen 1979-
Published: (2014)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
Financial investigation and forensic accounting
by: Manning, George A.
Published: (2011)
by: Manning, George A.
Published: (2011)
Computer crimes and digital investigation
by: Walden, Ian
Published: (2007)
by: Walden, Ian
Published: (2007)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008)
by: Barbara, John J.
Published: (2008)
Cyberpunk outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
The new forensics investigating corporate fraud and the theft of intellectual property
by: Anastasi, Joe 1953-
Published: (2003)
by: Anastasi, Joe 1953-
Published: (2003)
Forensic science fundamentals and investigations
by: Bertino, Anthony J., et al.
Published: (2012)
by: Bertino, Anthony J., et al.
Published: (2012)
A guide to forensic accounting investigation
by: Golden, Thomas W., et al.
Published: (2006)
by: Golden, Thomas W., et al.
Published: (2006)
An introduction to crime scene investigation
by: Dutelle, Aric W.
Published: (2011)
by: Dutelle, Aric W.
Published: (2011)
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)
by: Caloyannnides, Michael A.
Published: (2001)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Fraud auditing and forensic accounting
by: Singleton, Tommie W., et al.
Published: (2010)
by: Singleton, Tommie W., et al.
Published: (2010)
The investigation of fires
by: Roblee, Charles L., et al.
Published: (1988)
by: Roblee, Charles L., et al.
Published: (1988)
CSA guide to cloud computing implementing cloud privacy and security
by: Samani, Raj, et al.
Published: (2015)
by: Samani, Raj, et al.
Published: (2015)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
Forensic science advanced investigations
by: Brown, Rhonda M. 1966-, et al.
Published: (2012)
by: Brown, Rhonda M. 1966-, et al.
Published: (2012)
Investigative journalism
by: Bradshaw, Paul, et al.
Published: (2008)
by: Bradshaw, Paul, et al.
Published: (2008)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Computer security
by: Gollmann, Dieter
by: Gollmann, Dieter
Kesedaran keselamatan siber 101 penganalisaan ancaman siber
by: Madihah Mohd Saudi
Published: (2015)
by: Madihah Mohd Saudi
Published: (2015)
Forensic science : the basics
by: Siegel, Jay A., et al.
Published: (2010)
by: Siegel, Jay A., et al.
Published: (2010)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Similar Items
-
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010) -
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2016) -
Guide to computer forensics and investigations
Published: (2008) -
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
by: Laykin, Erik
Published: (2013) -
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)