Página InicialGruposDiscussãoMaisZeitgeist
Pesquisar O Sítio Web
Este sítio web usa «cookies» para fornecer os seus serviços, para melhorar o desempenho, para analítica e (se não estiver autenticado) para publicidade. Ao usar o LibraryThing está a reconhecer que leu e compreende os nossos Termos de Serviço e Política de Privacidade. A sua utilização deste sítio e serviços está sujeita a essas políticas e termos.

Resultados dos Livros Google

Carregue numa fotografia para ir para os Livros Google.

A carregar...

Cyber Crime Investigator's Field Guide

por Bruce Middleton

MembrosCríticasPopularidadeAvaliação médiaDiscussões
30Nenhum(a)791,578 (5)Nenhum(a)
"Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but there continues to be a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Third Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cybercrime. This volume is also well constructed for use in a college classroom environment, with questions at the end of each chapter (a separate answer guide is available for instructors). This volume also offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, IOC's (Indicator's of Compromise), UNIX / Linux commands, PowerShell commands, Windows commands, Cisco commands, and more. Also included in this 3rd edition is a section on rail transportation security, a synopsis of laws focused on cybercrime, Python 3.X programs, PowerShell programs, WireShark PCAP file analysis, use of Kali Linux tools, and more. Features: Analyses of the usage of the latest evidence collection and analysis tools Covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence"--… (mais)
Adicionado recentemente porGFA, dwhitenist, dwhite21788, caliope428, deftnerd
Nenhum(a)
A carregar...

Adira ao LibraryThing para descobrir se irá gostar deste livro.

Ainda não há conversas na Discussão sobre este livro.

Sem comentários
sem críticas | adicionar uma crítica
Tem de autenticar-se para poder editar dados do Conhecimento Comum.
Para mais ajuda veja a página de ajuda do Conhecimento Comum.
Título canónico
Título original
Títulos alternativos
Data da publicação original
Pessoas/Personagens
Locais importantes
Acontecimentos importantes
Filmes relacionados
Epígrafe
Dedicatória
Primeiras palavras
Citações
Últimas palavras
Nota de desambiguação
Editores da Editora
Autores de citações elogiosas (normalmente na contracapa do livro)
Língua original
DDC/MDS canónico
LCC Canónico

Referências a esta obra em recursos externos.

Wikipédia em inglês

Nenhum(a)

"Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but there continues to be a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Third Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cybercrime. This volume is also well constructed for use in a college classroom environment, with questions at the end of each chapter (a separate answer guide is available for instructors). This volume also offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, IOC's (Indicator's of Compromise), UNIX / Linux commands, PowerShell commands, Windows commands, Cisco commands, and more. Also included in this 3rd edition is a section on rail transportation security, a synopsis of laws focused on cybercrime, Python 3.X programs, PowerShell programs, WireShark PCAP file analysis, use of Kali Linux tools, and more. Features: Analyses of the usage of the latest evidence collection and analysis tools Covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence"--

Não foram encontradas descrições de bibliotecas.

Descrição do livro
Resumo Haiku

Current Discussions

Nenhum(a)

Capas populares

Ligações Rápidas

Avaliação

Média: (5)
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5 1

É você?

Torne-se num Autor LibraryThing.

 

Acerca | Contacto | LibraryThing.com | Privacidade/Termos | Ajuda/Perguntas Frequentes | Blogue | Loja | APIs | TinyCat | Bibliotecas Legadas | Primeiros Críticos | Conhecimento Comum | 204,717,123 livros! | Barra de topo: Sempre visível