Search alternatives:
computer worlds » computer world, computer worms, computer word
computer works » computer networks, complete works, computers networks
computers work » computers web, computer network

1
by Grubb, Sam
Published 2021
No Starch Press
Table of Contents: ... to Trick You -- How Black Hats Use Malware to Infect Your Computer -- How Black Hats Access Your Accounts...

2
by Cowen, David
Published 2013
McGraw-Hill
Table of Contents: ... Forensics -- How Computer Forensic Tools Work -- Types of Computer Forensic Tools -- Professional Licensing...

3
Published 2017
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

4
by Skulkin, Oleg
Published 2022
Packt Publishing, Limited
Subjects: ...Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103...

5
by Luttgens, Jason T.
Published 2014
McGraw-Hill Education
Table of Contents: ... for the Inevitable Incident -- Chapter 1: Real-World Incidents -- What Constitutes an Incident? -- What Is Incident...

6 Subjects: ...COMPUTERS / Data Processing / bisacsh...

7
by Wiles, Jack
Published 2007
Syngress Pub.
Table of Contents: ... Multi Operating System Environment; Digital Forensic Investigation Operations; Working Together To Build...

8
Published 2021
CRC Press
Table of Contents: ... -- Introduction -- Computer forensics -- Write blockers -- Imaging -- Add-ons and other technologies -- Tools...

9
by DeFranco, Joanna F.
Published 2014
CRC Press
Subjects: ...Computer security...

10
by Cross, Michael
Published 2008
Syngress Pub.
Table of Contents: ... the People on the Scene; 4: The Computer Investigation Process; 5: Acquiring Data, Duplicating Data...

11
by Monte, Matthew
Published 2015
Wiley
Table of Contents: ...Computer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions...

12
Published 2021
Springer International Publishing
Table of Contents: ... and Remote Working for UK organizations...

13
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... in a Wi-Fi world; Configuring our network card; Sniffing packets with Wireshark; Analyzing wireless...

14
Published 2008
Humana
Table of Contents: ...The Analog and Digital World -- Training and Education in Digital Evidence -- Certification...

15
by Muniz, Joseph
Published 2018
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

16
by Davidoff, Sherri
Published 2012
Prentice Hall
Subjects: ...Computer crimes / Investigation / Case studies...

17
by Alder, Raven
Published 2005
Syngress
Subjects: ...Computer crimes / fast...

18
by Nearchou, Nearchos
Published 2023
Packt publishing limited
Subjects: ...Computer crimes / Prevention...

19
by Shipley, Todd G.
Published 2014
Syngress
Table of Contents: ...Introduction to internet crime -- Internet criminals -- How the internet works -- Collecting...

20
by Doherty, Eamon P.
Published 2013
CRC Press
Table of Contents: ... by police -- Recovering existing or deleted data from USB devices -- Places to work at investigating mobile...