Now updated, this manual provides the information needed to track, monitor, investigate, document, and preserve both authorized and unauthorized actions that take place within an organizations operating environments. This second edition presents techniques that can help any computer security professional to identify misuse of a computer system.
Now updated, this manual provides the information needed to track, monitor, investigate, document, and preserve both authorized and unauthorized actions that take place within an organizations operating environments. This second edition presents techniques that can help any computer security professional to identify misuse of a computer system.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Introduction. Cyber Forensic Tools and Utilities. Concealment Techniques. Hardware: Model System Platforms. Software: Operating Systems, Network Traffic, and Applications. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards. Performing a Cyber Forensic Investigation Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionnaire. Privacy and Cyber Forensics: An Australian Perspective. The Forensic Black Bag. Digital Multifunctional Devices: Forensic Value and Corporate Exposure. Cyber Forensics and the Law: Legal Considerations Cyber-Forensics and the Changing Face of Investigating Criminal Behavior. Electronically Stored Information and Cyber Forensics Cyber Forensic Awareness: Management Survey. Appendices.
Introduction. Cyber Forensic Tools and Utilities. Concealment Techniques. Hardware: Model System Platforms. Software: Operating Systems, Network Traffic, and Applications. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards. Performing a Cyber Forensic Investigation Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionnaire. Privacy and Cyber Forensics: An Australian Perspective. The Forensic Black Bag. Digital Multifunctional Devices: Forensic Value and Corporate Exposure. Cyber Forensics and the Law: Legal Considerations Cyber-Forensics and the Changing Face of Investigating Criminal Behavior. Electronically Stored Information and Cyber Forensics Cyber Forensic Awareness: Management Survey. Appendices.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826