CyberForensics Understanding Information Security Investigations /
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the dec...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Totowa, NJ :
Humana Press : Imprint: Humana Press,
2010.
|
Edition: | First. |
Series: | Springer’s Forensic Laboratory Science Series,
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- The Complex World of Corporate CyberForensics Investigations
- Investigating Large-Scale Data Breach Cases
- Insider Threat Investigations
- Accounting Forensics
- Analyzing Malicious Software
- Network Packet Forensics
- RAM and File Systems Investigations
- One Picture is Worth a Million Bytes
- Cybercrime and Law Enforcement Cooperation
- Technology Malpractice.