libristo digital forensics and cyber crime 9536091

- znaleziono 5 produktów w 2 sklepach

Digital Forensics And Cyber Crime - 2840257436

219,99 zł

Digital Forensics And Cyber Crime

Książki Obcojęzyczne>Angielskie>Society & social sciences>Social services & welfare, criminology>Crime & criminologyKsiążki Obcojęzyczne&g...

0x0051ab6e00000000

Sklep: Gigant.pl

Practical Linux Forensics - 2878070131

234,08 zł

Practical Linux Forensics No Starch Press,US

Książki / Literatura obcojęzyczna

A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.Learn how to:   Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption   Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications   Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login   Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes   Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros   Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system   Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts   Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings   Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity

Sklep: Libristo.pl

Network Forensics - 2871892772

342,54 zł

Network Forensics Pearson Education

Książki / Literatura obcojęzyczna

"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself).Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensicsand find out.

Sklep: Libristo.pl

Textbook of Forensic Science - 2876546648

801,34 zł

Textbook of Forensic Science Springer, Berlin

Książki / Literatura obcojęzyczna

This textbook provides essential and fundamental information to modern forensics investigations. It discusses criminalistics and crime scene aspects, including investigation, management, collecting and packaging various types of physical evidence, forwarding, and chain of custody. It presents fundamental principles, ethics, challenges and criticism of forensic sciences and reviews the crime typologies, the correlates of crime, criminology, penology, and victimology. It provides a viewpoint on legal aspects, including types of evidence, the procedure in the court and scrutiny of the evidence and experts. The book summarizes forensic serological evidences such as blood, semen, saliva, milk-tears, sweat, vaginal fluids, urine, and sweat. It also provides an overview of forensic examination of different types of evidence and also includes comprehensive detailing of forensic ballistics including firearm classification, bullet comparison and matching. Further, it explores the examinations of drugs, chemicals, explosives, and petroleum products. It focuses on the various aspects of forensic toxicology, including the study of various poisons/toxins, associated signs and symptoms, a fatal dose /fatal period of poisons. The book also emphasizes digital and cyber forensics, including classification, data recovery tools, encryption and decryption methods, image, and video forensics.It is a useful resource for graduate and post-graduate students in the field of Forensic Science.

Sklep: Libristo.pl

Cybersecurity, Privacy and Freedom Protection in the Connected World - 2874913609

279,97 zł

Cybersecurity, Privacy and Freedom Protection in the Connected World Springer Nature Switzerland AG

Książki / Literatura obcojęzyczna

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures.  In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime.As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Sklep: Libristo.pl

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z libristo pl digital forensics and cyber crime 9536091

2. Szukaj na wszystkich stronach serwisu

t1=0.099, t2=0, t3=0, t4=0, t=0.099

Dla sprzedawców

copyright © 2005-2024 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER