Listing 1 - 3 of 3 |
Sort by
|
Choose an application
« The Definitive Guide to Computer Forensics: Theory and Hands-On Practice. Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject. Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever. The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins. » [Publisher]
Computer security. --- Data recovery (Computer science) --- 681.3*K65 --- Forensic sciences. --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer security --- Forensic sciences --- Systèmes informatiques --- Données --- Criminalistique --- Mesures de sûreté. --- Récupération (informatique) --- Systèmes informatiques --- Données --- Mesures de sûreté. --- Récupération (informatique)
Choose an application
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of
Android (Electronic resource). --- Computer crimes - Investigation. --- Computer crimes -- Investigation. --- Data recovery (Computer science). --- Google. --- Mobile computing - Security measures. --- Smartphones - Security measures. --- Smartphones -- Security measures. --- Smartphones --- Mobile computing --- Data recovery (Computer science) --- Computer crimes --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Investigation --- Security measures. --- Investigation. --- Android (Electronic resource) --- Information Technology --- General and Others --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Smart cell phones --- Smart phones --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- BackRub --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource) --- Electronic data processing --- Context-aware computing --- Portable computers --- Cell phones --- Pocket computers --- Criminal investigation --- Informatique mobile --- Données --- Informatique légale. --- Mesures de sûreté. --- Récupération (informatique) --- Google Android --- Informatique légale --- Données --- Informatique légale --- Mesures de sûreté. --- Récupération (informatique)
Choose an application
Electronic data processing --- Database management --- Data recovery (Computer science) --- Data protection --- Bases de données --- Récupération des données (Informatique) --- Protection de l'information (Informatique) --- Backup processing alternatives --- Gestion --- Database management. --- Data protection. --- Informatique --- Bases de données --- Données --- Protection de l'information (informatique) --- Backup processing alternatives. --- Procédures de secours. --- Gestion. --- Récupération (informatique) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- ADP backup processing alternatives --- Backup processing alternatives in electronic data processing --- Contingency planning in electronic data processing --- Data processing service centers --- Management --- Données --- Procédures de secours. --- Récupération (informatique)
Listing 1 - 3 of 3 |
Sort by
|