Catalog Search Results
Author
Pub. Date
2013
Language
English
Description
"This Computer forensics training course is taught by expert Ric Messier. The course teaches you how to get started in this industry. Computer forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field. Because computer forensics is a broad field, this...
64) Never let go
Author
Series
Uncommon justice volume 1
Language
English
Formats
Description
"Forensic genealogist Willow Anderson is on a quest for answers about a baby abducted from the hospital more than twenty years ago. The case may be cold, but things are about to heat up when someone makes an attempt on her life to keep her from discovering the truth. Her ex-flame - and an ex-FBI agent - Austin McKade offers to help. They follow the clues, even when it means Austin must face the past he's spent much of his life trying to forget. And...
Author
Series
Pub. Date
[2015]
Language
English
Description
Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book arms you with the strategies you need, no matter what programming language you use.
Author
Pub. Date
2018.
Language
English
Description
"Forensic Systems Analysis addresses relatively new developments in two professions: the law and engineering. The author covers the theory of process liability, management of operations, process liability and operations, analysis of dysfunctional processes, process risk analysis, and process/product verification and validation. He also discusses process stability, capability, and reliability. The narrative is addressed to both plaintiff and defendant...
67) Dead in a week
Author
Series
Forensic Instincts volume 7
Language
English
Formats
Description
Lauren Pennington is celebrating her junior year abroad when life comes to a screeching halt. At Munich's Hofbrühaus, she engages in an innocent flirtation with a charming stranger for the length of a drink. Drink finished, Lauren leaves--only to be snatched from the streets and thrown into an unmarked van. In a globe-spanning chase, from the beer halls of Germany, to the tech gardens of California, to the skyscrapers of China, and finally the farmlands...
69) Twisted
Author
Series
Tracers volume 5
Pub. Date
2012.
Language
English
Description
"Motive, opportunity, and no alibi-- rookie detective Allison Doyle knows it's as close to a slam dunk as most investigations get. But even though her small-town Texas police department has identified a prime suspect in a young woman's vicious murder, she can't rest easy. And when legendary FBI profiler Mark Wolfe shows up with a startling new theory, all her doubts are amplified. If Wolfe is correct, the real killer is an elusive psychopath who has...
Author
Pub. Date
©2008
Language
English
Description
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past...
Author
Pub. Date
2010
Language
English
Description
This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required.
Author
Language
English
Formats
Description
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats. An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response...
76) Struck dead
Author
Series
Forensic Instincts volume 10
Language
English
Formats
Description
"When a tragic hit-and-run takes the life of a hardworking family man, multi-millionaire Christopher Hillington becomes the prime suspect, and the whole city of New York alights with speculation as to what happened. But before the NYPD can establish Hillington's guilt, he himself is brutally murdered in his own home"--
Author
Pub. Date
2013
Language
English
Description
Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital...
Author
Series
Language
English
Description
This book provides a foundation for those new to the digital forensics field and teaches how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. The second edition features expanded resources and references, including online resources,...
Author
Pub. Date
2013
Language
English
Description
Covers the complete lifecycle of digital evidence and the chain of custody. This handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. It provides a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab.
Author
Pub. Date
©2012
Language
English
Description
"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request