Author: Keith J. Jones
Edition: 1
Binding: Paperback
ISBN: 0321525647
Edition: 1
Binding: Paperback
ISBN: 0321525647
Computer Forensics Library Boxed Set
Praise for Forensic Discovery "Farmer and Venema do for digital archaeology what Indiana Jones did for historical archaeology. Download Computer Forensics Library Boxed Set from rapidshare, mediafire, 4shared. Forensic Discovery unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder. I highly recommend reading this book."
--Richard Bejtlich, TaoSecurity Praise for Real Digital Forensics " Real Digital Forensics is as practical as a printed book can be. In a very methodical fashion, the authors cover live response (Unix, Windows), network-based forensics following the NSM model (Unix, Windows), forensics duplication, common forensics analysis techniques (su Search and find a lot of computer books in many category availabe for free download.
Computer Forensics Library Boxed Set Free
Computer Forensics Library Boxed Set computer books for free. In a very methodical fashion, the authors cover live response (Unix, Windows), network-based forensics following the NSM model (Unix, Windows), forensics duplication, common forensics analysis techniques (su
Related education books
Windows Forensic Analysis DVD Toolkit, Second Edition
"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis." -Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer "The Registry Analysis chapter alone is
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows is the largest operating system on desktops and servers worldwide, which means more intrusions, malware infections, and cybercrime happen on these systems. Author Harlan Carvey has brought his bestselling book up-to-date by covering the newes
Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windo
A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dang
No comments:
Post a Comment