Bruce Middleton
Cyber Crime Investigator's Field Guide (eBook, ePUB)
58,95 €
58,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
58,95 €
Als Download kaufen
58,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
58,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
29 °P sammeln
Bruce Middleton
Cyber Crime Investigator's Field Guide (eBook, ePUB)
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.91MB
Andere Kunden interessierten sich auch für
- Bruce MiddletonCyber Crime Investigator's Field Guide (eBook, PDF)58,95 €
- The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (eBook, ePUB)134,95 €
- The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (eBook, PDF)134,95 €
- Cyber-Physical Systems and Industry 4.0 (eBook, ePUB)119,95 €
- Albert Marcella Jr.Cyber Forensics (eBook, ePUB)123,95 €
- AI Based Advancements in Biometrics and its Applications (eBook, ePUB)51,95 €
- Ishaani PriyadarshiniCybersecurity (eBook, ePUB)128,95 €
-
-
-
This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 352
- Erscheinungstermin: 22. Juni 2022
- Englisch
- ISBN-13: 9781000610499
- Artikelnr.: 63955405
- Verlag: Taylor & Francis
- Seitenzahl: 352
- Erscheinungstermin: 22. Juni 2022
- Englisch
- ISBN-13: 9781000610499
- Artikelnr.: 63955405
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Bruce Middleton, CISSP, CEH, NSA IAM, and PMP, is a graduate of the University of Houston (BSEET), located in Houston, Texas, and of DeVry University (MBA).
Bruce has over 25 years of experience in the design and security of data communications networks. He began his career with the National Security Agency (NSA) while serving in the United States Army. He has worked on a number of extremely interesting projects for the intelligence community, Department of Defense, and other federal government agencies over the past three decades while working with government contractors such as Boeing, United Technologies, BAE Systems, Harris, and General Dynamics. Bruce was also a key player on the design/security of the communication system for NASA's International Space Station and a registered private detective in the state of Virginia.
Bruce is an international speaker on computer crime and has authored numerous articles for Security Management magazine and is a member of the FBI's InfraGard program. His latest venture for the past 5 years has been in the rail transportation industry with a global rail powerhouse named Alstom (Alstom.com), a French company headquartered in Paris, France, where Bruce served as the North American Regional Cyber Security Manager.
Bruce has over 25 years of experience in the design and security of data communications networks. He began his career with the National Security Agency (NSA) while serving in the United States Army. He has worked on a number of extremely interesting projects for the intelligence community, Department of Defense, and other federal government agencies over the past three decades while working with government contractors such as Boeing, United Technologies, BAE Systems, Harris, and General Dynamics. Bruce was also a key player on the design/security of the communication system for NASA's International Space Station and a registered private detective in the state of Virginia.
Bruce is an international speaker on computer crime and has authored numerous articles for Security Management magazine and is a member of the FBI's InfraGard program. His latest venture for the past 5 years has been in the rail transportation industry with a global rail powerhouse named Alstom (Alstom.com), a French company headquartered in Paris, France, where Bruce served as the North American Regional Cyber Security Manager.
Chapter 1
The Initial Contact Chapter 2
Client Site Arrival Chapter 3
Evidence Collection Procedures Chapter 4
Evidence Collection and Analysis Tools Chapter 5
Access Data's Forensic Toolkit Chapter 6
Guidance Software's EnCase Chapter 7
ILook Investigator Chapter 8
Password Recovery Chapter 9
Questions & Answers by Subject Area Chapter 10
Recommended Reference Materials Chapter 11
Case Study Chapter 12
Rail Transportation Chapter 13
Transhumanism and Robotics Chapter 14
Memory & Incident Response System Commands Chapter 15
Making Use of Open
Source Intelligence (OSINT) Appendix A
Glossary Appendix B
Port Numbers Used by Malicious Trojan Horse Programs Appendix C
Attack Signatures Appendix D
UNIX & Linux Commands Appendix E
Cisco Firewall Commands Appendix F
Discovering Unauthorized Access to Your Computer Appendix G
Electromagnetic Field Analysis (EFA) Appendix H
The Intelligence Community since 9
11 Appendix I
Answers to Chapter Questions
The Initial Contact Chapter 2
Client Site Arrival Chapter 3
Evidence Collection Procedures Chapter 4
Evidence Collection and Analysis Tools Chapter 5
Access Data's Forensic Toolkit Chapter 6
Guidance Software's EnCase Chapter 7
ILook Investigator Chapter 8
Password Recovery Chapter 9
Questions & Answers by Subject Area Chapter 10
Recommended Reference Materials Chapter 11
Case Study Chapter 12
Rail Transportation Chapter 13
Transhumanism and Robotics Chapter 14
Memory & Incident Response System Commands Chapter 15
Making Use of Open
Source Intelligence (OSINT) Appendix A
Glossary Appendix B
Port Numbers Used by Malicious Trojan Horse Programs Appendix C
Attack Signatures Appendix D
UNIX & Linux Commands Appendix E
Cisco Firewall Commands Appendix F
Discovering Unauthorized Access to Your Computer Appendix G
Electromagnetic Field Analysis (EFA) Appendix H
The Intelligence Community since 9
11 Appendix I
Answers to Chapter Questions
Chapter 1
The Initial Contact Chapter 2
Client Site Arrival Chapter 3
Evidence Collection Procedures Chapter 4
Evidence Collection and Analysis Tools Chapter 5
Access Data's Forensic Toolkit Chapter 6
Guidance Software's EnCase Chapter 7
ILook Investigator Chapter 8
Password Recovery Chapter 9
Questions & Answers by Subject Area Chapter 10
Recommended Reference Materials Chapter 11
Case Study Chapter 12
Rail Transportation Chapter 13
Transhumanism and Robotics Chapter 14
Memory & Incident Response System Commands Chapter 15
Making Use of Open
Source Intelligence (OSINT) Appendix A
Glossary Appendix B
Port Numbers Used by Malicious Trojan Horse Programs Appendix C
Attack Signatures Appendix D
UNIX & Linux Commands Appendix E
Cisco Firewall Commands Appendix F
Discovering Unauthorized Access to Your Computer Appendix G
Electromagnetic Field Analysis (EFA) Appendix H
The Intelligence Community since 9
11 Appendix I
Answers to Chapter Questions
The Initial Contact Chapter 2
Client Site Arrival Chapter 3
Evidence Collection Procedures Chapter 4
Evidence Collection and Analysis Tools Chapter 5
Access Data's Forensic Toolkit Chapter 6
Guidance Software's EnCase Chapter 7
ILook Investigator Chapter 8
Password Recovery Chapter 9
Questions & Answers by Subject Area Chapter 10
Recommended Reference Materials Chapter 11
Case Study Chapter 12
Rail Transportation Chapter 13
Transhumanism and Robotics Chapter 14
Memory & Incident Response System Commands Chapter 15
Making Use of Open
Source Intelligence (OSINT) Appendix A
Glossary Appendix B
Port Numbers Used by Malicious Trojan Horse Programs Appendix C
Attack Signatures Appendix D
UNIX & Linux Commands Appendix E
Cisco Firewall Commands Appendix F
Discovering Unauthorized Access to Your Computer Appendix G
Electromagnetic Field Analysis (EFA) Appendix H
The Intelligence Community since 9
11 Appendix I
Answers to Chapter Questions