Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Evidence, Expert --- Computer crimes --- Expertises --- Informatique légale --- Investigation --- Enquêtes
Choose an application
Computer crimes --- Cyberterrorism. --- Forensic sciences --- Cybercriminalité. --- Cybercriminalité --- Cyberterrorisme. --- Criminalistique. --- Informatique légale. --- Prevention --- Investigation --- Prévention.
Choose an application
This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives; computer hacking and malicious software; digital piracy and intellectual theft; economic crime and online fraud; pornography and online sex crime; cyber-bullying and cyber-stalking; cyber-terrorism and extremism; the rise of the Dark Web; digital forensic investigation and its legal context around the world; the law enforcement response to cybercrime transnationally; cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.
Computer crimes. --- Forensic sciences. --- Digital forensic science. --- Cyberterrorism --- Cybercriminalité --- Criminalistique. --- Criminalité informatique. --- Criminalité informatique --- Cyberterrorisme. --- Informatique légale. --- Prévention.
Choose an application
« Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace . Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. » [Publisher]
Gegevensbeveiliging --- Hackers --- Computer crimes --- Hackers. --- Forensic sciences. --- Informatique légale --- Pirates informatiques --- Criminalistique --- Investigation. --- Enquêtes. --- Gegevensbeveiliging (technisch) --- Hacker --- Informatique légale --- Enquêtes.
Choose an application
Computer crimes. --- Computer crimes --- Cyberterrorism. --- Criminalité informatique --- Informatique légale. --- Cyberterrorisme. --- Prevention. --- Investigation. --- Prévention. --- Cybercriminalité. --- Cybercriminalité --- Cybercriminalité. --- Cybercriminalité --- Informatique légale. --- Prévention.
Choose an application
Computer crimes --- Digital forensic science. --- Electronic evidence. --- Evidence, Criminal. --- Preuve (droit pénal) --- Preuve électronique. --- Informatique légale --- Investigation. --- Enquêtes.
Choose an application
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of
Android (Electronic resource). --- Computer crimes - Investigation. --- Computer crimes -- Investigation. --- Data recovery (Computer science). --- Google. --- Mobile computing - Security measures. --- Smartphones - Security measures. --- Smartphones -- Security measures. --- Smartphones --- Mobile computing --- Data recovery (Computer science) --- Computer crimes --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Investigation --- Security measures. --- Investigation. --- Android (Electronic resource) --- Information Technology --- General and Others --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Smart cell phones --- Smart phones --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- BackRub --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource) --- Electronic data processing --- Context-aware computing --- Portable computers --- Cell phones --- Pocket computers --- Criminal investigation --- Informatique mobile --- Données --- Informatique légale. --- Mesures de sûreté. --- Récupération (informatique) --- Google Android --- Informatique légale --- Données --- Informatique légale --- Mesures de sûreté. --- Récupération (informatique)
Listing 1 - 7 of 7 |
Sort by
|