X-Ways Forensics Practitioner's Guide
1477 Kč
Sleva až 70% u třetiny knih
A complete reference guide to the use of forensic applications available, software that is used by law enforcement agencies and private forensic examiners. It provides explanations of the complete forensic investigation processes using X-Ways Forensics. It takes you from installation to the advanced features of the software.
Autor: | Shavers, Brett (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital |
Nakladatel: | Syngress Media,U.S. |
ISBN: | 9780124116054 |
Rok vydání: | 2013 |
Jazyk : | Angličtina |
Vazba: | Paperback |
Počet stran: | 264 |
Mohlo by se vám také líbit..
-
The Basics of Cyber Warfare
Winterfeld, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity
-
CISSP Study Guide
Conrad, Eric
-
Security Risk Management
Evans V., DooleyJ., Wheeler A.
-
SQL Injection Attacks and Defense
Clarke-Salt, Justin
-
Industrial Network Security
Knapp, Eric D. (Director of Critical Infrastructure Markets for NitroSecurity); Samani, Raj (VP, CTO for McAfee EMEA; CL
-
Threat Forecasting
Pirc, John (Director, Security Solutions, Forsythe Technology and Co-Founder & Advisor, Bricata, LLC); DeSanto, David (D
-
Automating Open Source Intelligence
Robert A. Slayton
-
Violent Python
O'Connor, TJ
-
Logging and Log Management
Schmidt, Kevin; Chuvakin, Anton
-
Keys to the Kingdom
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
Information Security Risk Assessment...
Talabis, Mark
-
Google Hacking for Penetration Testers
Long, Johnny (Security Researcher); Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall Univers
-
The Basics of Digital Forensics
Sammons, John
-
Breaking into Information Security
More, Josh (Senior Security Consultant, RJS Smart Security (CISSP, GIAC-GCIH, GIAC-GSLC)); Stieber, Anthony J. (has over
-
Practical Deployment of Cisco Identi...
Richter, Mandy
-
A Guide to Kernel Exploitation
Perla, Enrico