Search alternatives:
wells » cells, tells

1
by Wells, Joseph T.
Published 2018
John Wiley & Sons, Inc.

2
by Wells, Joseph T.
Published 2010
John Wiley & Sons
.... The cases each are entertaining stories in their own right, as well as educational, and readers will enjoy...

3
by Wells, Joseph T.
Published 2013
John Wiley & Sons, Inc.

4
by Fell, Gregory J., Barlow, Mike
Published 2016
O'Reilly Media
... and well. According to Center for Strategic and International Studies, cyber crime and cyber espionage cost...

5
by Rehberger, Johann
Published 2020
Packt Publishing
... with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you...

6
by Nesterenko, Sergii
Published 2018
Packt
... harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see...

7
by Altheide, Cory
Published 2011
Syngress
...Based on the use of open source tools, this book lends itself to many organizations as well...

9
by Lillard, Terrence
Published 2010
Syngress
... and analyzed from network traffic. This book will help security and network forensics professionals, as well...

10
by Shakarian, Paulo
Published 2013
Syngress
... but from military, sociological, and scientific perspectives as well...

11
by Quayson, Ato
Published 2012
Routledge
.... Such labour migration is sometimes legal and well managed, but sometimes not so - with migrant workers...

12
by Bunting, Steve
Published 2012
Wiley
... investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The only official...

13
by Hepfer, Manuel, Lawrence, Thomas B., Meyrick, Julian, D'Urso, Pompeo
Published 2022
MIT Sloan Management Review
..., they describe three common mistakes people make that inhibit successful recovery from a cyberattack, as well...

14
Published 2018
O'Reilly Media, Inc.
.... Called metadata, this information can be of great interest and use to law enforcement personnel as well...

15
by Singh, Balwinder
Published 2014
Pearson
... atmosphere of cynicism in order to channel well-thought improvements that will strengthen and reinforce...

16
Published 2022
Assemble You
... responses to make us voluntarily compromise our own security. In this track, we'll learn about social...

17
by Sammons, John
Published 2015
Syngress
... response, and electronic discovery; as well as updated case studies, and expert interviews. --...

18
by Kipper, Gregory
Published 2007
Auerbach Publications
..., wireless security techniques and wireless crime techniques, as well as conducting forensic analysis...

19
by Moyo, Siegfried
Published 2022
Wiley
... of cyber risk that will enable executive leadership to make well-informed decisions along with their senior...

20
Published 2017
O'Reilly Media, Inc.
...- to intermediate-level IT professionals as well as law enforcement personnel can learn to use tools like Volatility...