Image from Google Jackets

Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.

By: Contributor(s): Material type: TextTextPublication details: Boston, MA : Addison-Wesley, 2001.Description: xiii, 398 : ill. ; 24 cmISBN:
  • 0201707195
Subject(s): DDC classification:
  • 005.8 21
LOC classification:
  • QA76.9.A25 K78 2001
Contents:
Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books MAIN General AUE Library Collection QA76.9 .A25 K78 2001 (Browse shelf(Opens below)) 1 Available 10023891
Books Books MAIN General AUE Library Collection QA76.9 .A25 K78 2001 (Browse shelf(Opens below)) 2 Available 10006801
Browsing MAIN shelves, Shelving location: General, Collection: AUE Library Collection Close shelf browser (Hides shelf browser)
QA76.9 .A25 J64 2011 Security policies and implementation issues QA76.9.A25 K536 2012 Fundamentals of information systems security / QA76.9 .A25 K78 2001 Computer forensics : QA76.9 .A25 K78 2001 Computer forensics : QA76.9.A25 L49 2015 Critical infrastructure protection in homeland security : QA76.9 .A25 M428 2009 Hacking exposed 6 : QA76.9.A25 M4286 2006 Software Security Building Security in

Includes bibliographical references (p. 381-384) and index.

Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system.

There are no comments on this title.

to post a comment.