Computer and Intrusion ForensicsArtech House, 2003 - 395 strán (strany) Annotation A comprehensive and broad introduction to computer and intrusion forensics, covering the areas of law enforcement, national security and corporate fraud, this practical book helps professionals understand case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, and machine learning. |
Obsah
V | 1 |
VII | 4 |
VIII | 6 |
IX | 12 |
X | 14 |
XI | 21 |
XII | 23 |
XIII | 27 |
LXXVIII | 190 |
LXXIX | 191 |
LXXX | 200 |
LXXXI | 204 |
LXXXII | 205 |
LXXXIII | 206 |
LXXXIV | 207 |
LXXXV | 209 |
XIV | 29 |
XV | 31 |
XVI | 32 |
XVII | 35 |
XVIII | 37 |
XIX | 39 |
XX | 41 |
XXII | 42 |
XXIII | 44 |
XXIV | 46 |
XXV | 49 |
XXVI | 57 |
XXVII | 59 |
XXVIII | 61 |
XXIX | 63 |
XXX | 67 |
XXXI | 69 |
XXXII | 72 |
XXXIII | 76 |
XXXIV | 77 |
XXXV | 86 |
XXXVI | 90 |
XXXVII | 94 |
XXXVIII | 98 |
XXXIX | 103 |
XL | 104 |
XLI | 113 |
XLIII | 117 |
XLIV | 121 |
XLV | 123 |
XLVII | 128 |
XLVIII | 133 |
L | 143 |
LI | 146 |
LII | 147 |
LIV | 149 |
LV | 152 |
LVI | 153 |
LVII | 154 |
LVIII | 159 |
LIX | 160 |
LX | 163 |
LXI | 164 |
LXIII | 165 |
LXIV | 167 |
LXV | 168 |
LXVI | 169 |
LXVII | 175 |
LXIX | 176 |
LXX | 177 |
LXXI | 178 |
LXXII | 180 |
LXXIII | 183 |
LXXIV | 184 |
LXXV | 187 |
LXXVI | 188 |
LXXVII | 189 |
LXXXVI | 210 |
LXXXVII | 211 |
LXXXVIII | 212 |
LXXXIX | 214 |
XC | 215 |
XCI | 216 |
XCII | 217 |
XCIV | 218 |
XCV | 219 |
XCVI | 221 |
XCVII | 223 |
C | 225 |
CI | 226 |
CII | 229 |
CIII | 230 |
CIV | 231 |
CV | 232 |
CVI | 236 |
CVIII | 237 |
CIX | 239 |
CX | 242 |
CXI | 244 |
CXIII | 248 |
CXIV | 253 |
CXV | 257 |
CXVII | 264 |
CXVIII | 267 |
CXIX | 274 |
CXX | 276 |
CXXI | 278 |
CXXII | 280 |
CXXIII | 285 |
CXXIV | 288 |
CXXV | 295 |
CXXVI | 303 |
CXXVII | 306 |
CXXVIII | 308 |
CXXIX | 310 |
CXXX | 312 |
CXXXI | 319 |
CXXXII | 323 |
CXXXIII | 327 |
CXXXIV | 331 |
CXXXV | 335 |
CXXXVI | 339 |
CXXXVII | 340 |
CXXXVIII | 343 |
CXXXIX | 345 |
CXL | 349 |
CXLI | 355 |
CXLII | 360 |
CXLIII | 364 |
CXLIV | 369 |
CXLV | 379 |
383 | |
Iné vydania - Zobraziť všetky
Časté výrazy a frázy
algorithms analyze application attack attributes Audit Benford's Law Chapter cluster communications computer crime computer evidence computer forensic examiner computer forensic specialist computer forensics computer networks computer security computer systems court criminal cryptography data mining database dataset deleted detection systems developed digital evidence disk imaging document duplicate e-mail electronic evidence encryption event logs example Ext2 extraction FF FF FF file system forensic analysis forensic investigation forensic tools fraud detection fraudulent activity hardware header host identify ILook integrity International Internet Intrusion Detection intrusion forensics law enforcement link analysis Linux Microsoft Windows Microsoft Word monitoring objects operating system packet partition password potential Protocol provides records regression analysis relationships relevant requirements retrieval Section sector servers signature steganography techniques time-lining timestamps UNIX utilities virus visited April 2002 visited July 2002 visited March 2002 vulnerabilities