Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 24 from your keywords: subject="Computer crimes -- In...
First Page Previous 1 2 3 Next Last Page
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, SteveJohnson, RyanPearson, Scott

Table of contents Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows Filesystems 179 C…

Edition
Second Edition
ISBN/ISSN
9781118163825
Collation
xxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m
Availability1
Add to basket
MARC DownloadCite
cover
Computer forensics: investigating hard disks, file and operating systems (vol…
Comment Share
Helba, Stephen

Table of contents: 1. Understanding file systems and hard disks 2. Understanding digital media devices 3. Windows, Lunux, and Macintosh boot processes 4. Windows forensics I 5. Windows forensics II 6. Linux forensics 7. Application password crackers

Edition
--
ISBN/ISSN
9781435483507
Collation
various pagings.; ilus.; 28 cm
Series Title
--
Call Number
363.25 HEL i
Availability1
Add to basket
MARC DownloadCite
cover
E-discovery: an introduction to digital evidence
Comment Share
Amelia, PhillipsGodfrey, RonaldSteuart, ChristopherBrown, Christine

Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery

Edition
--
ISBN/ISSN
9781111310646
Collation
xvi, 254 hal.; ilus.; 24 cm
Series Title
--
Call Number
347.73 PHI e
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion analysis: methodologies, tools, and techniques for incident…
Comment Share
Fichera, JoeBolt, Steven

Table of Contents Chapter 1. Introduction Introducing Network Intrusion Analysis Chapter 2. Intrusion Methodologies and Artifacts Stage 1: Pre-Intrusion Actions: AKA Reconnaissance Stage 2: Intrusion Methods References Chapter 3. Incident Response Introduction Section 1: Methodology Trusted Toolset Commercial Triage Tools Section 2 Memory Acquisition Introduction Acquisition…

Edition
1st edition
ISBN/ISSN
9781597499620
Collation
xii, 239 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FIC n
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics for handheld devices
Comment Share
Doherty, Eamon P

Table of contents: 1. Preface 2. Disclaimer 3. Author 4. The cell phone 5. Digital camera forensics 6. The PDAs and digital forensics 7. GPS devices 8. Corporate investigations on a netbook 9. Cell phone investigations by police 10. Recovering existing or deleted data from USB devices 11. Places to work at investigating mobile devices 12. References 13. …

Edition
--
ISBN/ISSN
9781439898772
Collation
xxvii, 303 hal.; ilus.; 27 cm
Series Title
--
Call Number
363.25 DOH d
Availability1
Add to basket
MARC DownloadCite
cover
Guide to computer forensics and investigations
Comment Share
Steuart, ChristopherNelson, BillPhillips, Amelia

Table of Contents 1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. …

Edition
Fourth Edition
ISBN/ISSN
9781435498839
Collation
xxv, 682 hal.; ilus.; 24 cm + 1 DVD-ROM
Series Title
--
Call Number
005.8 NEL g
Availability1
Add to basket
MARC DownloadCite
cover
Scene of the cybercrime
Comment Share
Cross, Michael

Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…

Edition
2nd Edition
ISBN/ISSN
9781597492768
Collation
iv, 732 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.8 CRO s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber crime investigations : bridging the gaps between security professionals…
Comment Share
Reyes, AnthonyBrittson, RichardO'Shea, KevinSteel, Jim

Table of contents Chapter 1: Introduction: The Problem at Hand Chapter 2: "Computer Crime" discussed Chapter 3: Preparing for prosecution and testifying Chapter 4: Cyber Investigative Roles Chapter 5: Incident Response: live forensics and investigrations Chapter 6: Legal issues of intercepting WIFI transmissions Chapter 7: Seizure of digital information Chapter 8: Conducting Cyber Inv…

Edition
--
ISBN/ISSN
9781597491334
Collation
xix, 412 hal.; ilus.; 23 cm
Series Title
--
Call Number
363.23 REY c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber crime and cyber terrorism investigator's handbook
Comment Share
Akhgar, BabakStaniforth, AndrewBosco, Francesca M.

Table of Contents Chapter 1: Cyberspace: The new frontier for policing? Abstract The Shape of the Challenge The Size of the Challenge The Response Conclusion Chapter 2: Definitions of Cyber Terrorism Abstract Introduction The Confusion About Cyber Terrorism Cyber Terrorism Definition Has Cyber Terrorism Ever Occurred? Conclusions …

Edition
--
ISBN/ISSN
9780128007433
Collation
xxiii, 282 hal.; ilus.; 24 cm
Series Title
--
Call Number
R363.23 AKH c
Availability1
Add to basket
MARC DownloadCite
cover
The best damn cybercrime and digital forensics book period
Comment Share
Reyes, AnthonyCardwell, KevinWiles, Jack

Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/​electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…

Edition
--
ISBN/ISSN
9781597492287
Collation
xxxv, 699 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.23 REY b
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?