Search alternatives:
"forensics" » "forensic"

1
by Marcella, Albert J.
Published 2012
Wiley
Table of Contents: ...Cyber Forensics: From Data to Digital Evidence; Contents; Preface; Acknowledgments; Chapter 1...

3
by Laykin, Erik
Published 2013
John Wiley
Table of Contents: ... on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index...

4
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... characteristics for getting to satisfactory completion of the case; The TAARA methodology for network forensics...

5
by Mantone, Pamela S.
Published 2013
Wiley
Table of Contents: ...; Summary; Chapter 2: The "Norm" and the "Forensic" Preliminary Analytics: Basics Everyone Should Know...

6
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ... -- ch. 13. User authentication methods -- ch. 14. Computer and network forensics -- ch. 15. Malware...

7
by Evans, Ariel
Published 2022
Routledge
..., Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk...

8
by Koppl, Roger
Published 2012
Emerald
Table of Contents: ... informed decisions when confronted with forensic evidence / E. James Cowan -- ch. 10. Experts...

9
by Petrucelli, Joseph R.
Published 2013
Wiley
Table of Contents: ...GETTING A HANDLE ON TRANSACTIONSTHE 10 FORENSICALLY ACCEPTED GENERALLY ACCEPTED ACCOUNTING...

10
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine...

11
by Padgett, Simon
Published 2015
John Wiley & Sons
Table of Contents: ... in Forensic Investigations -- PART III: BUILDING A FRAUD PROFILING METHODOLOGY FOR YOUR ORGANIZATION: Chapter...

12
by Dennis, Lynda
Published 2018
John Wiley & Sons, Incorporated
... to sharpen their forensic skills and uncover and avoid fraudulent activities. It provides an informative case...