Search alternatives:
dann » kann, ann
danns » kanns, anns, hanns, danny, danes
dannyn » kannyn, annyn, danny, dannen, dannin
dam » dame
dans » das, dass
dansn » dasn, dassn, danson, dansen, danse

1
by Davidoff, Sherri
Published 2020
Addison-Wesley
Subjects: ...Business / Data processing / Security measures / fast...

2
by Wietholter, Leah
Published 2022
John Wiley & Sons, Inc.
..."In Data Sleuthing: Using Data in Forensic Accounting Engagements and Fraud Investigations...

3
by Dobrin, Adam
Published 2016
Springer International Publishing
Table of Contents: ...Introduction -- Chapter 2: Police Data -- Chapter 3: Public Health Data -- Chapter 4: Specialty...

4
by Golden, Ryan, Freed, Anthony M.
Published 2024
O'Reilly Media, Inc.
... don't just encrypt systems and data and then ask for a ransom payment. Instead, they first steal...

5
by Schroader, Amber
Published 2007
Syngress
Table of Contents: ... 4. Forensic Acquisition; Chapter 5. Data Analysis -- Chapter; 6. Future of ADS....

6
by Borges, Dan
Published 2022
Packt Publishing
Subjects: ...Data protection / fast...

7
by Borges, Dan
Published 2021
Packt
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

8
Published 2018
O'Reilly Media, Inc.
...Digital files store a lot of information beyond the data that makes up the primary file content...

9
by Ablon, Lillian, Libicki, Martin C., Abler, Andrea M.
Published 2014
RAND Corporation
Subjects: ...Data protection...

10
by Sammons, John
Published 2015
Syngress
Subjects: ...Forensic sciences / Data processing / fast...

11 Table of Contents: ...part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part...

12
by Hayden, Lance
Published 2010
McGraw Hill
Table of Contents: ...1. What is a security metric? -- 2. Designing effective security metrics -- 3. Understanding data...

13
by Marcella, Albert J.
Published 2012
Wiley
Table of Contents: ...Cyber Forensics: From Data to Digital Evidence; Contents; Preface; Acknowledgments; Chapter 1...

14
by Cobham, Alex, Jansky, Petr
Published 2020
Oxford University Press
... of existing data and methodologies, identifying the most promising avenues for future improvement...

15
by Sachowski, Jason
Published 2019
CRC Press
Table of Contents: ... -- Understanding forensic readiness -- Define business risk scenarios -- Identity potential data sources...

16
by Parasram, Shiva V. N.
Published 2017
Packt Publishing
Table of Contents: ... acquisition -- Powered-on devices -- Powered-off devices -- Write blocking -- Data imaging and hashing...

17
by Baesens, Bart, Van Vlasselaer, Véronique, Verbeke, Wouter
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ...Fraud: detection, prevention, and analytics! -- Data collection, sampling, and preprocessing...

18
by Lillard, Terrence
Published 2010
Syngress
Table of Contents: ... -- CHAPTER 7 NetWitness Investigator -- CHAPTER 8 SilentRunner by AccessData -- PART V MAKING YOUR NETWORK...

20
by Leo, Philipp, Isik, Öykü, Muhly, Fabian
Published 2022
MIT Sloan Management Review
...' data and extort payment as a condition of restoring access. The majority of business leaders who fall...