Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Computer crimes --- Cyberspace --- Criminalité informatique --- Cyberespace --- Systèmes informatiques --- prévention --- Aspect économique --- Mesures de sûreté --- Criminalité informatique --- prévention. --- Aspect économique. --- Mesures de sûreté. --- Cybercriminalité
Choose an application
Veiligheid van de Staat --- Sûreté de l'Etat --- historisch kader --- le cadre historique --- wetgeving --- législation --- functionering --- fonctionnement
Choose an application
« The Definitive Guide to Computer Forensics: Theory and Hands-On Practice. Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject. Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever. The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins. » [Publisher]
Computer security. --- Data recovery (Computer science) --- 681.3*K65 --- Forensic sciences. --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer security --- Forensic sciences --- Systèmes informatiques --- Données --- Criminalistique --- Mesures de sûreté. --- Récupération (informatique) --- Systèmes informatiques --- Données --- Mesures de sûreté. --- Récupération (informatique)
Choose an application
Internal security --- Illegal aliens --- Organized crime --- Crime prevention --- European Union --- Sûreté de l'Etat --- Immigrants clandestins --- Crime organisé --- Criminalité --- Prévention --- European Union countries --- Pays de l'Union européenne --- Emigration and immigration --- Emigration et immigration --- Sûreté de l'Etat --- Crime organisé --- Criminalité --- Prévention --- Pays de l'Union européenne --- #SBIB:051.IOS --- #SBIB:327.7H232 --- #SBIB:35H431 --- Crime syndicates --- Organised crime --- Crime --- Aliens --- Aliens, Illegal --- Illegal immigrants --- Illegal immigration --- Undocumented aliens --- Alien detention centers --- Human smuggling --- Prevention of crime --- Public safety --- Europese Unie: binnenlands beleid en justitie --- Beleidssectoren: binnenlands beleid en justitie --- Legal status, laws, etc. --- Prevention --- Government policy --- European Union. --- E.U. --- Emigration and immigration. --- Migration. Refugees --- International relations. Foreign policy --- Noncitizens
Choose an application
“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks. The book is written for Linux/UNIX administrators who do not necessarily have in-depth knowledge of security but need to know how to secure their networks.
Linux device drivers (Computer programs) --- Computer security. --- Operating systems (Computers) --- Software maintenance. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer program maintenance --- Computer programs --- Computer software --- Maintenance, Software --- Software revision --- Computer programming --- Software reengineering --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Device drivers (Computer programs) --- Maintenance --- Operating systems --- Protection --- Security measures --- Open source software. --- Computer programming. --- Software engineering. --- Open Source. --- Software Engineering/Programming and Operating Systems. --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Free software (Open source software) --- Open code software --- Opensource software --- Programming --- Software maintenance --- Linux, Pilotes de périphérique pour (logiciels) --- Réseaux d'ordinateurs --- Logiciels --- Systèmes d'exploitation (ordinateurs) --- Mesures de sûreté --- Linux, Pilotes de périphérique pour (logiciels) --- Réseaux d'ordinateurs --- Systèmes d'exploitation (ordinateurs) --- Mesures de sûreté
Listing 1 - 5 of 5 |
Sort by
|