Check nearby libraries
Buy this book
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.
Check nearby libraries
Buy this book
Previews available in: English
Showing 1 featured edition. View all 1 editions?
Edition | Availability |
---|---|
1
Hacking exposed computer forensics
2010, McGraw-Hill/Osborne, McGraw-Hill
in English
- 2nd ed.
0071626778 9780071626774
|
aaaa
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Edition Notes
Includes index.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created July 28, 2014
- 10 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
December 19, 2023 | Edited by ImportBot | import existing book |
July 18, 2023 | Edited by ImportBot | import existing book |
March 8, 2023 | Edited by MARC Bot | import existing book |
October 27, 2022 | Edited by ImportBot | import existing book |
July 28, 2014 | Created by ImportBot | Imported from Internet Archive item record. |