1
by Cardwell, Kevin
Published 2007
Syngres
Table of Contents: ... investigations -- Ch. 10. Acquiring data, duplicating data, and recovering deleted files -- Ch. 11. Forensic...

2
by Cappelli, Dawn
Published 2012
Addison-Wesley
Subjects: ...Data protection / fast...

3
by Davidoff, Sherri
Published 2020
Addison-Wesley
Subjects: ...Business / Data processing / Security measures / fast...

4
by Wietholter, Leah
Published 2022
John Wiley & Sons, Inc.
..."In Data Sleuthing: Using Data in Forensic Accounting Engagements and Fraud Investigations...

5
by Dobrin, Adam
Published 2016
Springer International Publishing
Table of Contents: ...Introduction -- Chapter 2: Police Data -- Chapter 3: Public Health Data -- Chapter 4: Specialty...

6
by Golden, Ryan, Freed, Anthony M.
Published 2024
O'Reilly Media, Inc.
... don't just encrypt systems and data and then ask for a ransom payment. Instead, they first steal...

7
by Schroader, Amber
Published 2007
Syngress
Table of Contents: ... 4. Forensic Acquisition; Chapter 5. Data Analysis -- Chapter; 6. Future of ADS....

8
by Ablon, Lillian, Libicki, Martin C., Abler, Andrea M.
Published 2014
RAND Corporation
Subjects: ...Data protection...

9
Published 2018
O'Reilly Media, Inc.
...Digital files store a lot of information beyond the data that makes up the primary file content...

10 Table of Contents: ...part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part...

11
by Hayden, Lance
Published 2010
McGraw Hill
Table of Contents: ...1. What is a security metric? -- 2. Designing effective security metrics -- 3. Understanding data...

12
by Marcella, Albert J.
Published 2012
Wiley
Table of Contents: ...Cyber Forensics: From Data to Digital Evidence; Contents; Preface; Acknowledgments; Chapter 1...

13
by Cobham, Alex, Jansky, Petr
Published 2020
Oxford University Press
... of existing data and methodologies, identifying the most promising avenues for future improvement...

14
by Parasram, Shiva V. N.
Published 2017
Packt Publishing
Table of Contents: ... acquisition -- Powered-on devices -- Powered-off devices -- Write blocking -- Data imaging and hashing...

15
by Lillard, Terrence
Published 2010
Syngress
Table of Contents: ... -- CHAPTER 7 NetWitness Investigator -- CHAPTER 8 SilentRunner by AccessData -- PART V MAKING YOUR NETWORK...

16
by Baesens, Bart, Van Vlasselaer, Véronique, Verbeke, Wouter
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ...Fraud: detection, prevention, and analytics! -- Data collection, sampling, and preprocessing...

18
by Leo, Philipp, Isik, Öykü, Muhly, Fabian
Published 2022
MIT Sloan Management Review
...' data and extort payment as a condition of restoring access. The majority of business leaders who fall...

19
by Eve, Martin Paul
Published 2021
Punctum Books
Subjects: ...Copyright and electronic data processing...

20
by Reghunadhan, Ramnath
Published 2022
Palgrave Macmillan
Subjects: ...Data protection...