Flylib.com
Part III: Computer Forensics Analysis
Previous page
Table of content
Next page
< Day Day Up >
CHAPTER LIST
Chapter 8: Discovery of Electronic Evidence
Chapter 9: Identification of Data
Chapter 10: Reconstructing Past Events
Chapter 11: Networks
< Day Day Up >
Previous page
Table of content
Next page
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
Assessing Business-IT Alignment Maturity
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring ROI in E-Commerce Applications: Analysis to Action
Metrics and Models in Software Quality Engineering (2nd Edition)
The Spiral Model
Reliability Models
In-Process Metrics for Software Testing
An Example of Module Design Metrics in Practice
Quality and Quality Management Metrics
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Monitoring and Controlling Risky Projects
Appendix A Selected Detail From the PERIL Database
SQL Hacks
Hack 9. Filter on Indexed Columns
Hack 48. Prevent an SQL Injection Attack
Organizing Data
Hack 77. Fill in Missing Values in a Pivot Table
Hack 89. Choose Any Three of Five
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Cisco Secure IDS
Laws, Standards, and Organizations
Security Business Issues
The Future of Intrusion Detection and Prevention
.NET System Management Services
Querying WMI
Handling WMI Events
The WMI Schema
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies