Cyber Crime Investigator's Field Guide, Second Edition
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press LLC
2011
|
Những chủ đề: | |
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26296 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-26296 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-262962012-03-03T04:41:02Z Cyber Crime Investigator's Field Guide, Second Edition Middleton, Bruce Tin học Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime. This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more. 2011-10-25T02:04:35Z 2011-10-25T02:04:35Z 2002 Book 0-8493-1192-6 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26296 en application/pdf CRC Press LLC |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
topic |
Tin học |
spellingShingle |
Tin học Middleton, Bruce Cyber Crime Investigator's Field Guide, Second Edition |
description |
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.
This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more. |
format |
Book |
author |
Middleton, Bruce |
author_facet |
Middleton, Bruce |
author_sort |
Middleton, Bruce |
title |
Cyber Crime Investigator's Field Guide, Second Edition |
title_short |
Cyber Crime Investigator's Field Guide, Second Edition |
title_full |
Cyber Crime Investigator's Field Guide, Second Edition |
title_fullStr |
Cyber Crime Investigator's Field Guide, Second Edition |
title_full_unstemmed |
Cyber Crime Investigator's Field Guide, Second Edition |
title_sort |
cyber crime investigator's field guide, second edition |
publisher |
CRC Press LLC |
publishDate |
2011 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26296 |
_version_ |
1757666244961501184 |