Search alternatives:
computers » computer

1
Published 2017
O'Reilly Media, Inc.
Subjects: ...Operating systems (Computers) / Security measures / fast...

2
by Pogue, Chris
Published 2008
Syngress Pub.
Table of Contents: ... System -- Ch. 7. File Analysis -- Ch. 8. Malware -- Appendix. Implementing Cybercrime Detection...

3
by Hoog, Andrew
Published 2011
Syngress
Table of Contents: ... Software Development Kit and Android Debug Bridge Chapter 4 Android File Systems and Data Structures...

4
by Carvey, Harlan A.
Published 2011
Syngress
Subjects: ...Operating systems (Computers) / fast...

5
by Carvey, Harlan A.
Published 2016
Syngress is an imprint of Elsevier
Table of Contents: ...Registry analysis -- Processes and tools -- Analyzing the system hives -- Case studies: User hives...

6
by Shaaban, Ayman, Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents: ...The distributed forensic system -- GRR -- Server installation -- Client installation -- Browsing...

7
by Diogenes, Yuri, Ozkaya, Erdal
Published 2018
Packt Publishing
Table of Contents: ... -- Compromising operating systems -- Compromising systems using Kon-Boot or Hiren's BootCD -- Compromising systems...

8
by Cowen, David
Published 2013
McGraw-Hill
Table of Contents: ... Up the Investigation -- Using File System Meta-data to Track Leaked or Printed Materials -- Chapter...

9
by Parasram, Shiva V. N.
Published 2017
Packt Publishing
Table of Contents: ... available in the field of digital forensics -- Operating systems and open source tools for digital forensics...

10
by Sulkin, Oleg, Courcier, Scar de
Published 2017
Packt Publishing
Table of Contents: ... -- Introduction -- Why Windows? -- Windows file system -- Identifying evidence sources -- Ensuring evidence...

11
by Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents: ...; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System...

12
by Nikkel, Bruce
Published 2016
No Starch Press
Table of Contents: ... -- Accessing logical, virtual, and operating system encrypted images -- Extracting subsets of forensic images...

13
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ..., and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis...

14 Subjects: ...Malware (Computer software) / fast...

15
by Borges, Dan
Published 2022
Packt Publishing
Subjects: ...Computer crimes / fast...

16
by Borges, Dan
Published 2021
Packt
Subjects: ...Computer crimes / fast / (OCoLC)fst00872063...

17
by Reiber, Lee
Published 2016
McGraw-Hill Education
Table of Contents: ... Mobile Devices -- Personal Computers -- Once You Find It, What's Next?...

18
by Windley, Phillip J.
Published 2005
O'Reilly
Table of Contents: ... cryptography; 6.3.1.3. Hybrid key systems; 6.3.1.4. Public key cryptosystem algorithms...

19
by Carvey, Harlan A.
Published 2009
Syngress Pub.
Subjects: ...Computer networks / Security measures / fast...

20
by Kubasiak, Ryan R.
Published 2009
Syngress Pub.
Table of Contents: ...Tiger and Leopard Mac OS X operating systems -- Getting a handle on Mac hardware -- Mac disks...