Call Number (LC) | Title | Results |
---|---|---|
HV8079.C65 |
A practical guide to computer forensics investigations / Operating system forensic analysis. Capture and analysis of network-based evidence. Windows registry forensics : advanced digital forensic analysis of the Windows registry / Digital forensics and Internet of Things / Computer forensics and investigations / Practical cyber forensics : an incident-based approach to forensic investigations / Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques / Cloud forensics demystified : decoding cloud investigation complexities for digital forensic professionals / Practical forensic analysis of artifacts on iOS and Android devices : investigating complex mobile devices / Learning computer forensics / Learn computer forensics : your one-stop guide to searching, analyzing, acquiring, and securing digital evidence / Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business / Practical forensic imaging : securing digital evidence with Linux tools / Mobile forensic investigations : a guide to evidence collection, analysis, and presentation / Intelligence-Driven Incident Response : outwitting the adversary / Practical Linux forensics : a guide for digital investigators / Intelligence-driven incident response : outwitting the adversary / Deception in the digital age : exploiting and defending human targets through computer-mediated communications / Digital forensics and cyber crime with Kali Linux fundamentals / Integrating Python with Leading Computer Forensics Platforms. Dissecting the hack : the V3rb0ten network / Incident response primer : how to keep from getting pwned too hard / EnCase computer forensics : the official EnCE : EnCase certified examiner study guide / Cyber Crime Investigator's Field Guide. Python digital forensics cookbook : effective Python recipes for digital investigations / Implementing digital forensic readiness : from reactive to proactive process / Executing Windows command line investigations : while ensuring evidentiary integrity / A blueprint for implementing best practice procedures in a digital forensic laboratory : meeting the requirements of ISO standards and other best practices / Dissecting the hack : the v3rb0ten network / The basics of digital forensics : the primer for getting started in digital forensics / Windows forensics cookbook : 61 recipes to help you analyze Windows systems / Mobile forensics -- the file format handbook : common file formats and file systems used in mobile devices / Multimedia forensics / Incident Response for Windows : Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems / Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / |
38 |
HV8079 .C65 2013eb | Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. | 1 |
HV8079.C65 .A37 2014eb | Cyber crime and cyber terrorism investigator's handbook / | 1 |
HV8079.C65 A474 2011eb | Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. / | 1 |
HV8079.C65 A57 2012 | Mastering Windows network forensics and investigation / | 1 |
HV8079.C65 B36 2020 | Cybercrime investigations : a comprehensive resource for everyone / | 1 |
HV8079.C65 B37 2010 | Virtualization and forensics : a digital forensic investigator's guide to virtual environments / | 2 |
HV8079.C65 B65 2011eb | Xbox 360 forensics : a digital forensics guide to examining artifacts / | 1 |
HV8079.C65 C37 2007eb | Windows forensic analysis : DVD toolkit / | 1 |
HV8079.C65 C3726 2012 | Windows forensic analysis toolkit / | 1 |
HV8079.C65 C3726 2014eb | Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / | 1 |
HV8079.C65 C38 2009eb | Windows forensic analysis DVD toolkit 2E / | 1 |
HV8079.C65 C58 1996 | Investigating computer crime / | 1 |
HV8079.C65 C665 1989 | Organizing for computer crime investigation and prosecution / | 1 |
HV8079.C65 C68 2013 | Computer forensics : infoSec Pro guide / | 2 |
HV8079.C65 C76 2007eb | CD and DVD forensics / | 1 |
HV8079.C65 C765 2008eb | Scene of the cybercrime. | 1 |
HV8079.C65 C933 2023 | Cyber investigations : a research based introduction for advanced studies / | 1 |
HV8079.C65 D348 2012 | Network forensics : tracking hackers through cyberspace / | 1 |
HV8079.C65 D54 2010 | Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / | 2 |