Incident Response. Computer Forensics Toolkit
* Incident response and forensic investigation are the processes of detecting attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks * This much-needed reference covers the methodologies for incident response and computer forensics, Federal Compute...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
Wiley Publishing
2011
|
Những chủ đề: | |
Truy cập trực tuyến: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26359 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-26359 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-263592012-03-03T05:14:13Z Incident Response. Computer Forensics Toolkit Schweitzer, Douglas Tin học * Incident response and forensic investigation are the processes of detecting attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks * This much-needed reference covers the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence requirements, legal issues, and working with law enforcement * Details how to detect, collect, and eradicate breaches in e-mail and malicious code 2011-10-31T08:52:25Z 2011-10-31T08:52:25Z 2003 Book 0-7645-2636-7 https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26359 en application/pdf Wiley Publishing |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
topic |
Tin học |
spellingShingle |
Tin học Schweitzer, Douglas Incident Response. Computer Forensics Toolkit |
description |
* Incident response and forensic investigation are the processes of detecting attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks
* This much-needed reference covers the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence requirements, legal issues, and working with law enforcement
* Details how to detect, collect, and eradicate breaches in e-mail and malicious code |
format |
Book |
author |
Schweitzer, Douglas |
author_facet |
Schweitzer, Douglas |
author_sort |
Schweitzer, Douglas |
title |
Incident Response. Computer Forensics Toolkit |
title_short |
Incident Response. Computer Forensics Toolkit |
title_full |
Incident Response. Computer Forensics Toolkit |
title_fullStr |
Incident Response. Computer Forensics Toolkit |
title_full_unstemmed |
Incident Response. Computer Forensics Toolkit |
title_sort |
incident response. computer forensics toolkit |
publisher |
Wiley Publishing |
publishDate |
2011 |
url |
https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26359 |
_version_ |
1819789026705539072 |