1
by Carlson, Benjamin Patrick
Published 2020
John Wiley & Sons, Inc.
... in history? What are the conditions under which fraud tends to work best? What steps can people take to avoid...

2
by Gough, Leo
Published 2013
Pearson
Subjects: ...Commercial crimes / History...

4
by Ventre, Daniel
Published 2011
ISTE
Subjects: ...HISTORY / Military / Biological & Chemical Warfare / bisacsh...

5
by Shakarian, Paulo
Published 2013
Syngress
Subjects: ...HISTORY / Military / Strategy / bisacsh...

6
by Swinson, Christopher
Published 2019
Routledge
...Financial history...

7
by Craig, Paul
Published 2005
Syngress
Table of Contents: ...Inside software piracy -- The history of software piracy -- The suppliers -- Crackers...

8
by Morrissey, Sean
Published 2010
[Apress]
Table of Contents: ...History of Apple mobile devices -- iOS operating and file system analysis -- Search, seizure...

9
by Kubasiak, Ryan R.
Published 2009
Syngress Pub.
Table of Contents: ... browser history -- Recovery of e-mail artifacts, iChat, and other chat logs -- Locating and recovering...

10
by Messier, Ric
Published 2014
Syngress
Table of Contents: ...; History of the Internet; Significant security events; Evolution of services; Today's risks (in a Nutshell...

11
by Hayes, Darren R.
Published 2015
Pearson
Table of Contents: ... Opportunities -- A History of Computer Forensics -- 1980's: The Advent of the Personal Computer -- 1990...

12
by Skulkin, Oleg
Published 2022
Packt Publishing, Limited
Table of Contents: ...Section 1: Getting Started with a Modern Ransomware Attack -- Chapter 1: The History of Human...

13
by Shaaban, Ayman, Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents: ... investigation -- Microsoft Internet Explorer -- History files -- History.IE5 -- IEHistoryView...

14
by Winkler, Ira
Published 2007
Syngress
Table of Contents: ... is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat...

15
by Parasram, Shiva V. N.
Published 2023
Packt Publishing, Limited
Table of Contents: ... Response Fundamentals and Best Practices -- Chapter 6: Understanding File Systems and Storage -- History...

16
by Edelbacher, Max
Published 2012
CRC Press
Table of Contents: ... -- History of crisis and the quest for security / Gerald Schöpfer -- Development toward a "security society...

17
by Graves, Michael W.
Published 2014
Addison-Wesley
..., Internet history and much more...

18
by Nearchou, Nearchos
Published 2023
Packt publishing limited
...What you will learn Understand the history of cybercrime, the dark web, and the use of Tor Discover...

19
by Parasram, Shiva V. N.
Published 2017
Packt Publishing
Table of Contents: ... history of digital forensics -- The need for digital forensics as technology advances -- Commercial tools...

20
by Sachowski, Jason
Published 2016
Syngress
Table of Contents: ...; INTRODUCTION; HISTORY OF DIGITAL CRIME AND FORENSICS; PROLOGUE (1960-80); INFANCY (1980-95); CHILDHOOD (1995...