Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("blog" OR "log")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"364 - Criminology"
Search alternatives
:
"blog" »
"blong"
"log" »
"long"
Showing
1
-
20
of
29
Search:
'("blog" OR "log")'
,
query time: 0.07s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Justice to forests : improving criminal justice efforts to combat illegal logging
by
Goncalves, Marilyne Pereira
Published 2012
World Bank
Subjects:
“
...
Logging
...
”
Read Now
2
Cloud forensics demystified : decoding cloud investigation complexities for digital forensic professionals
by
Ramakrishnan, Ganesh
,
Haqanee, Mansoor
Published 2024
Packt Publishing
Table of Contents:
“
...: DFIR Investigations --
Logs
in Azure -- Azure
Log
Analytics -- Azure Virtual Networks -- NSG flow
logs
...
”
Call Number:
HV8079.C65
Read Now
3
Mastering Windows network forensics and investigation
by
Anson, Steve
Published 2012
Sybex
Table of Contents:
“
... -- The registry structure -- Registry evidence -- Introduction to malware -- Text-based
logs
-- Windows event
logs
...
”
Call Number:
HV8079.C65
Read Now
4
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
by
Carvey, Harlan A.
Published 2014
Syngress
Table of Contents:
“
...Persistence mechanismArtifacts; Detecting Malware;
Log
analysis; Dr. Watson
logs
; AV scans; AV...
”
Call Number:
HV8079.C65
Read Now
5
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
by
Troncone, Paul
,
Albing, Carl
Published 2019
O'Reilly Media
Table of Contents:
“
... ; Data analysis ; Real-time
log
monitoring ; Tool: Network monitor ; Tool: Filesystem monitor ; Malware...
”
Call Number:
QA76.9.A25
Read Now
6
Web Application Defender's Cookbook : Battling Hackers and Protecting Users
by
Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Table of Contents:
“
... Detection System Signatures; Recipe 1-5: Using Bayesian Attack Payload Detection; HTTP Audit
Logging
; Recipe...
”
Call Number:
QA76.9.A25
Read Now
7
Practical Windows forensics : leverage the power of digital forensics for Windows systems
by
Shaaban, Ayman
,
Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents:
“
... -- RegistryRipper -- Sysinternals -- MiTeC Windows registry recovery -- Summary -- Chapter 8: Event
Log
Analysis...
”
Call Number:
HV8079.C65
Read Now
8
Practical Linux forensics : a guide for digital investigators
by
Nikkel, Bruce
Published 2022
no starch press
Table of Contents:
“
... and filesystems -- Directory layout and forensic analysis of Linux files -- Investigating evidence from Linux
log
...
”
Call Number:
HV8079.C65
Read Now
9
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
by
Kubasiak, Ryan R.
Published 2009
Syngress Pub.
Table of Contents:
“
... browser history -- Recovery of e-mail artifacts, iChat, and other chat
logs
-- Locating and recovering...
”
Call Number:
QA76.9.A25
Read Now
10
Operating system forensic analysis
Published 2017
O'Reilly Media, Inc.
“
... valuable information in the Windows Registry. You'll also see how to create and use
logs
with Windows Event...
”
Call Number:
HV8079.C65
Read Now
11
Windows Forensics : Understand Analysis Techniques for Your Windows
by
Easttom, Chuck
,
Butler, William
,
Phelan, Jessica
,
Bhagavatula, Ramya Sai
Published 2024
Apress
Table of Contents:
“
... Files --
Log
Files -- Recycle Bin -- I30 File -- USN Journal...
”
Call Number:
QA76.76.M52
Read Now
12
The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator
by
Kleiman, Dave
Published 2007
Syngress
Table of Contents:
“
... -- Computer Forensic Tools -- Application password crackers -- Investigating
Logs
-- Investigating network...
”
Call Number:
QA76.9.A25
Read Now
13
Phishing and communication channels : a guide to identifying and mitigating phishing attacks
by
Sonowal, Gunikhan
Published 2022
Apress
“
... communications are most commonly used, including email, SMS, voice,
blog
, wifi, and more Be familiar...
”
Call Number:
HV6773
Read Now
14
Cybercrime investigation case studies : an excerpt from Placing the suspect behind the keyboard
by
Shavers, Brett
Published 2013
Syngress
Table of Contents:
“
...; 1.2.5 Scenario-Threatening
Blog
Posts; 1.2.6 Making the Wrong Kind of Friends Online; 1.2.7 A Break...
”
Call Number:
HV8079.C65
Read Now
15
Python digital forensics cookbook : effective Python recipes for digital investigations
by
Miller, Preston
,
Bryce, Chapin
Published 2017
Packt Publishing
Table of Contents:
“
... and Indicators of Compromise Recipes -- 6: Reading Emails and Taking Names Recipes -- 7:
Log
-Based Artifact...
”
Call Number:
HV8079.C65
Read Now
16
The best damn cybercrime and digital forensics book period
by
Cardwell, Kevin
Published 2007
Syngres
Table of Contents:
“
.... Windows and Linux forensics -- Ch. 14. Investigating network traffic and investigating
logs
-- Ch. 15...
”
Call Number:
HV6773
Read Now
17
Malware Analysis Using Artificial Intelligence and Deep Learning
Published 2021
Springer International Publishing
Table of Contents:
“
.... Cluster Analysis of Malware Family Relationships -- 18.
Log
-Based Malicious Activity Detection using...
”
Read Now
18
Computer forensics : infoSec Pro guide
by
Cowen, David
Published 2013
McGraw-Hill
Table of Contents:
“
... Certifications -- Staying Current -- Conferences --
Blogs
-- Forums -- Podcasts -- Associations -- Chapter 3...
”
Call Number:
HV8079.C65
Read Now
19
Digital Forensics : threatscape and best practices
by
Sammons, John
Published 2016
Syngress is an imprint of Elsevier
Table of Contents:
“
...; Multibit
log
; The bitcoin protocol in action; Inv packet; Inv packet data...
”
Call Number:
HV8079.C65
Read Now
20
Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques
by
Mohammed, Muhiballah
Published 2023
Packt Publishing Ltd.
“
... tailored for Windows OS, decipher patterns within user data, and
log
and untangle intricate artifacts...
”
Call Number:
HV8079.C65
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 364 - Criminology
Year of Publication
From:
To:
Classification
364 - Criminology
363 - Other social problems & services
12
500 - Natural sciences & mathematics
12
005 - Computer programming, programs & data
11
331 - Labor economics
9
384 - Communications; telecommunication
3
more ...
330 - Economics
2
001 - Knowledge
1
006 - Special computer methods
1
338 - Production
1
621 - Applied physics
1
see all ...
less ...
Language
English
28
Japanese
1
Collection
O'Reilly
27
Springer eBooks 2005-
1
World Bank E-Library Archive
1
Author
Albing, Carl
2
Carvey, Harlan A.
2
Shavers, Brett
2
Troncone, Paul
2
Alazab, Mamoun
1
Anson, Steve
1
more ...
Barnett, Ryan C.
1
Bhagavatula, Ramya Sai
1
Bryce, Chapin
1
Butler, William
1
Cardwell, Kevin
1
Cowen, David
1
Datt, Samir
1
Doherty, Eamon P.
1
Easttom, Chuck
1
Fowler, Kevvie
1
Goncalves, Marilyne Pereira
1
Haqanee, Mansoor
1
Ivtchenko, Dmitri
1
Johansen, Gerard
1
Kleiman, Dave
1
Kubasiak, Ryan R.
1
Miller, Preston
1
Mohammed, Muhiballah
1
Morrissey, Sean
1
Nikkel, Bruce
1
Oriyano, Sean-Philip
1
Phelan, Jessica
1
Ramakrishnan, Ganesh
1
Sachowski, Jason
1
Sammons, John
1
Sapronov, Konstantin
1
Shaaban, Ayman
1
Shalaginov, Andrii
1
Sonowal, Gunikhan
1
Stamp, Mark
1
Takahashi, Motonobu
1
Varsalone, Jesse
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&lookfor=%28%22blog%22+OR+%22log%22%29&type=AllFields
Send by Email
×
Loading...