Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Data mining --- Cluster analysis --- 681.3*H2 --- datamining --- zoekstrategieën --- clusteranalyse --- informatica --- 527.3 --- 527.9 --- Database management: security; integrity; protection--See also {?681.5*E5} --- databases - software --- informatica, informatietechnologie - overige specifieke toepassingen --- Cluster analysis. --- Data mining. --- Data recovery (Computer science) --- Data recovery (Computer science). --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Electronic data processing --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Correlation (Statistics) --- Multivariate analysis --- Spatial analysis (Statistics) --- Acqui 2006
Choose an application
« The Definitive Guide to Computer Forensics: Theory and Hands-On Practice. Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject. Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever. The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins. » [Publisher]
Computer security. --- Data recovery (Computer science) --- 681.3*K65 --- Forensic sciences. --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer security --- Forensic sciences --- Systèmes informatiques --- Données --- Criminalistique --- Mesures de sûreté. --- Récupération (informatique) --- Systèmes informatiques --- Données --- Mesures de sûreté. --- Récupération (informatique)
Listing 1 - 2 of 2 |
Sort by
|