Cantitate/Preț
Produs

Cyber Crime Investigator's Field Guide

Autor Bruce Middleton
en Limba Engleză Paperback – 25 ian 2005

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.

This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.

Citește tot Restrânge

Preț: 49533 lei

Preț vechi: 61396 lei
-20%

Puncte Express: 743

Preț estimativ în valută:
9490 10279$ 8138£

Carte indisponibilă temporar

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780849327681
ISBN-10: 0849327687
Pagini: 296
Ilustrații: 66 b/w images and 10 tables
Dimensiuni: 167 x 242 x 21 mm
Greutate: 0.56 kg
Ediția:2Revizuită
Editura: Auerbach Publications

Public țintă

Information security professionals in business, government, and the military; developers of cyber-forensic hardware and software; police and private investigators; internal and external auditors; fraud examiners, bankers, insurance investigators

Descriere

Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. This title provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.