1
by Lillard, Terrence
Published 2010
Syngress
Table of Contents: ... FORENSICS -- CHAPTER 12 The Future of Cloud Computing -- CHAPTER 13 The Future of Network Forensics...

2
by Alder, Raven
Published 2005
Syngress
Subjects: ...Computer crimes / fast...

3
by Monte, Matthew
Published 2015
Wiley
Table of Contents: ...Computer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions...

4
by Fichera, Joe
Published 2012
Syngress
Subjects: ...Computer networks / Access control / http://id.loc.gov/authorities/subjects/sh2007008424...

5
by Jaswal, Nipun
Published 2019
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

6
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ...'s exchange principle; Defining network forensics; Differentiating between computer forensics and network...

7
by Davidoff, Sherri
Published 2012
Prentice Hall
Subjects: ...Computer crimes / Investigation / Case studies...

8
by Anson, Steve
Published 2012
Sybex
Table of Contents: ...Network investigation overview -- The Microsoft network structure -- Beyond the Windows GUI...

9
by Solomon, Michael
Published 2011
Wiley Pub.
Table of Contents: ...The need for computer forensics -- Preparation -- what to do before you start -- Computer evidence...

10
Published 2017
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

11
by Timm, Carl
Published 2010
Syngress/Elsevier
Table of Contents: ...Social networking infrastructure attacks -- Malware attacks -- Phishing attacks -- Evil twin...

12
Published 2017
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

13
by Rajnovic, Damir
Published 2011
Cisco Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

14
by Peltier, Thomas R.
Published 2003
Auerbach Publications
Table of Contents: ...Introduction -- Project scoping -- Assessing current network concerns -- Network vulnerability...

15
by Messier, Ric
Published 2013
InfiniteSkills
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

16
by Clarke, Nathan
Published 2010
IT Governance Pub.
Table of Contents: ... -- Ch. 6. Embedded and network forensics...

17
by Hayes, Darren R.
Published 2015
Pearson
Table of Contents: ...Machine generated contents note: Introduction -- Popular Myths about Computer Forensics -- Types...

18
Published 2019
Springer International Publishing
Subjects: ...Computer Communication Networks...

19 Table of Contents: ...Introduction ; Overview; Analyzing Social Networks; Securing Social Networks; Outline of the Book...

20
by Shinder, Debra Littlejohn, Tittel, Ed
Published 2002
Syngress Pub.
Table of Contents: ... the Cybercriminal Mindset -- Chapter 4: Understanding Computer and Networking Basics -- Chapter 5: Understanding...