51,95 €
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
26 °P sammeln
51,95 €
51,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
26 °P sammeln
Als Download kaufen
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
26 °P sammeln
Jetzt verschenken
51,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
26 °P sammeln
  • Format: PDF

A comprehensive and broad introduction to computer and intrusion forensics, this practical book helps you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The book presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. You also learn the principles and processes for effectively handling evidence from digital sources and law enforcement considerations in dealing with…mehr

  • Geräte: PC
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 5.27MB
  • FamilySharing(5)
Produktbeschreibung
A comprehensive and broad introduction to computer and intrusion forensics, this practical book helps you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The book presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. You also learn the principles and processes for effectively handling evidence from digital sources and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy. The book opens with a comprehensive introduction to computer and intrusion forensics and relates them to computer security in general and computer network security. It details the current practice of computer forensics and its role in combating computer crime, and examines the relationship between intrusion detection and intrusion forensics. What's more, the book explores the most important new areas for future research in computer forensics. This leading-edge resource is an indispensable reference for working professionals and post-graduate students alike.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
George Mohay is adjunct professor in the Information Security Research Center, Queensland University of Technology. He has done extensive research in the areas of computer security, computer forensics, concurrency, component technology and distributed systems. He holds a Ph.D. in theoretical chemistry from Monash University in Melbourne. He has published extensively. Alison Anderson is senior lecturer on the Faculty of Information Technology and researcher in the Information Security Research Center at the Queensland University of Technology. She holds a Ph.D. in computer security from the Queensland University of Technology and an MIS in information technology from the University of Queensland, Brisbane. Olivier de Vel is head of computer forensics at the Defence Science and Technology Organisation, Department of Defence, Australia. He holds a Ph.D. in electronic engineering from the Institut National Polytechnique de Grenoble (INPG), France, and an M.Sc. in physics from the University of Waikato, New Zealand. Rod McKemmish is senior manager, forensics, at KPMG, and has worked as a computer forensic specialist in Australian Law Enforcement and the private sector for the past 11 and half years. He holds a B.Bus.. degree in business administration from the Royal Melbourne Institute of Technology. Byron Collie is senior information security engineer for the Wells Fargo Services Company and was a Federal Agent with the Australian Federal Police for 16 years during which time he also worked with the Royal Australian Air Force Directorate of Information Warfare.