Limit Search Results
Author
Language
Format
Subject
126 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS
2. 
Cover image for Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence
3. 
Cover image for Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterprise
4. 
Cover image for CCFP certified cyber forensics professional certification : exam guide
5. 
Cover image for CHFI computer hacking forensic investigator : exam guide
6. 
Cover image for CHFI computer hacking forensic investigator certification  exam guide
7. 
Cover image for CCFP certified cyber forensics professional certification  exam guide
8. 
Cover image for Computer forensics : cybercriminals, laws, and evidence
9. 
Cover image for The basics of digital forensics : the primer for getting started in digital forensics
11. 
Cover image for Cloud storage forensics
12. 
Cover image for Computer incident response and forensics team management : conducting a successful incident response
13. 
Cover image for System forensics, investigation and response
14. 
Cover image for E-discovery : an introduction to digital evidence
17. 
Cover image for What every engineer should know about cyber security and digital forensics
18. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
19. 
Cover image for E-discovery an introduction to digital evidence
20. 
Cover image for Digital forensics for handheld devices
22. 
Cover image for Computer forensics : infoSec Pro guide
26. 
Cover image for Digital forensics explained
27. 
Cover image for Investigating computer-related crime
29. 
Cover image for Cybercrime and cloud forensics : applications for investigation processes
33. 
Cover image for Digital forensics processing and procedures : meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements
34. 
Cover image for Cybercrime investigative case management : an excerpt from placing the suspect behind the keyboard
35. 
Cover image for The basics of digital forensics : the primer for getting started in digital forensics
36. 
Cover image for The computer incident response planning handbook : executable plans for protecting information at risk
41. 
Cover image for Xbox 360 forensics : a digital forensics guide to examining artifacts
42. 
Cover image for Cybercrime : investigating high-technology computer crime
43. 
Cover image for Windows registry forensics advanced digital forensic analysis of the Windows registry
44. 
Cover image for Digital forensics with open source tools / Cory Altheide, Harlan Carvey
45. 
Cover image for Managing the risk of fraud and misconduct : meeting the challenges of a global regulated, and digital environment
46. 
Cover image for Computer forensics jumpstart
47. 
Cover image for Windows registry forensics : advanced digital forensic analysis of the Windows registry
48. 
Cover image for Cyber security, cyber crime and cyber forensics : applications and perspectives
49. 
Cover image for Machine learning forensics for law enforcement, security, and intelligence
50. 
Cover image for Handbook of electronic security and digital forensics
51. 
Cover image for Digital triage forensics: processing the digital crime scene
52. 
Cover image for Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
53. 
Cover image for Guide to computer forensics and investigations[electronic resource]
54. 
Cover image for Guide to computer forensics and investigations
56. 
Cover image for Handbook of digital forensics and investigation
57. 
Cover image for Computer forensics jumpstart
59. 
Cover image for Virtualization and forensics : a digital forensic investigator's guide to virtual environments
61. 
Cover image for Hacking exposed computer forensics : secrets & solutions
63. 
Cover image for Poque unix forensic analysis
64. 
Cover image for Handbook of digital and multimedia forensic evidence
65. 
Cover image for Cyber forensics : a field manual for collecting, examining and preserving evidence of computer crimes
67. 
Cover image for UNIX  and linux forensic analysis DVD toolkit
68. 
Cover image for Scene of the cybercrime
69. 
Cover image for Malware forensics : investigating and analyzing malicious code
70. 
Cover image for Investigating digital crime
71. 
Cover image for Computer forensics :  evidence collection and management
72. 
Cover image for Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors
73. 
Cover image for CD and DVD forensics
74. 
Cover image for Wireless crime and forensic investigation
75. 
Cover image for Mastering windows network forensics and investigation
76. 
Cover image for Advances in digital forensics III IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007
77. 
Cover image for The best damn cybercrime and forensics book period
78. 
Cover image for Computer forensics : an essential guide for accountants, lawyers, and managers
79. 
Cover image for Advances in digital forensics : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2006
80. 
Cover image for Computer evidence collection & preservation
81. 
Cover image for Forensic computer crime investigation
82. 
Cover image for Computer evidence : collection & preservation
83. 
Cover image for Windows forensics : the field guide for corporate computer investigations
84. 
Cover image for Computer forensics jumpstart
85. 
Cover image for Real digital forensics
86. 
Cover image for Real digital forensics :  computer security and incident response
87. 
Cover image for Cyber crime investigator's field guide
88. 
Cover image for Hacking exposed computer forensics : secrets & solutions
92. 
Cover image for Incident response : computer forensics toolkit
94. 
Cover image for Investigative data mining for security and criminal detection
95. 
Cover image for Incident response and computer forensics
96. 
Cover image for Death match
97. 
Cover image for Tom Clancy's Net Force : state of war
98. 
Cover image for Computer forensics : computer crime scene investigation
99. 
Cover image for Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes
100. 
Cover image for Handbook of computer crime investigation : forensic tools and technology
101. 
Cover image for Computer forensics : computer crime scene investigation
102. 
Cover image for Transnational criminal organizations, cybercrime, and money laundering : a handbook for law enforcement officers, auditors, and financial investigators
125. 
Cover image for Big Data Analytics with Applications in Insider Threat Detection
126. 
Cover image for Computer Forensics : Evidence Collection and Management