Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 32 from your keywords: subject="investigation"
First Page Previous 1 2 3 4 Next Last Page
cover
Digital forensics processing and procedures: meeting the requirements of ISO …
Comment Share
Watson, DavidJones, Andrew

Terdapat bibliografi dan indeks. Table of contents: 1 - Introduction 2 - Forensic Laboratory Accommodation 3 - Setting up the Forensic Laboratory 4 - The Forensic Laboratory Integrated Management System 5 - Risk Management 6 - Quality in the Forensic Laboratory 7 - IT Infrastructure 8 - Incident Response 9 - Case Processing 10 - Case Management 11 - Evidence Presentation 12 - Sec…

Edition
--
ISBN/ISSN
9781597497428
Collation
xxi, 857 hal.; ilus.; 28 cm
Series Title
--
Call Number
363.25 WAT d
Availability1
Add to basket
MARC DownloadCite
cover
Computer evidence: collection and preservation
Comment Share
Brown, Christopher L. T.

Terdapat indeks. Table of Contents: Part I Computer Forensics and Evidence Dynamics 1. Computer Forensics Essentials 2. Rules of Evidence, Case Law, and Regulation 3. Evidence Dynamics Part II Information Systems 4. Interview, Policy, and Audit 5. Network Topology and Architecture 6. Volatile Data Part III Data Storage Systems and Media 7. Physical Disk Technologies 8. SAN, …

Edition
Second Edition
ISBN/ISSN
9781584506997
Collation
xxvii, 518 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
363.25 BRO c
Availability1
Add to basket
MARC DownloadCite
cover
Malware forensics: investigating and analyzing malicious code
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H

Terdapat indeks. Table of contents: Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 4 - Post-Mortem Forensics: Discovering a…

Edition
--
ISBN/ISSN
9781597492683
Collation
xxxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 AQU j
Availability1
Add to basket
MARC DownloadCite
cover
Placing the suspect behind the keyboard: using digital forensics and investig…
Comment Share
Carvey, HarlanShavers, Brett

Table of Contents Chapter 1. Introduction Digital Evidence Collection Simple File Copying “Dead Box” Approaches “Live Box” Approaches Decision-Making FlowChart Preview/Triage SmartPhones and Cellular Devices Chapter 2. High Tech Interview Introduction The Main Goal of Questioning a Suspect The Line of Questions for Suspects Questions for Victims Questions for Network Adm…

Edition
--
ISBN/ISSN
9781597499859
Collation
xxii, 267 hal.; ilus.; 25 cm
Series Title
--
Call Number
363.25 SHA p
Availability1
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, SteveJohnson, RyanPearson, Scott

Table of contents Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows Filesystems 179 C…

Edition
Second Edition
ISBN/ISSN
9781118163825
Collation
xxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m
Availability1
Add to basket
MARC DownloadCite
cover
Computer forensics: investigating hard disks, file and operating systems (vol…
Comment Share
Helba, Stephen

Table of contents: 1. Understanding file systems and hard disks 2. Understanding digital media devices 3. Windows, Lunux, and Macintosh boot processes 4. Windows forensics I 5. Windows forensics II 6. Linux forensics 7. Application password crackers

Edition
--
ISBN/ISSN
9781435483507
Collation
various pagings.; ilus.; 28 cm
Series Title
--
Call Number
363.25 HEL i
Availability1
Add to basket
MARC DownloadCite
cover
E-discovery: an introduction to digital evidence
Comment Share
Amelia, PhillipsGodfrey, RonaldSteuart, ChristopherBrown, Christine

Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery

Edition
--
ISBN/ISSN
9781111310646
Collation
xvi, 254 hal.; ilus.; 24 cm
Series Title
--
Call Number
347.73 PHI e
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion analysis: methodologies, tools, and techniques for incident…
Comment Share
Fichera, JoeBolt, Steven

Table of Contents Chapter 1. Introduction Introducing Network Intrusion Analysis Chapter 2. Intrusion Methodologies and Artifacts Stage 1: Pre-Intrusion Actions: AKA Reconnaissance Stage 2: Intrusion Methods References Chapter 3. Incident Response Introduction Section 1: Methodology Trusted Toolset Commercial Triage Tools Section 2 Memory Acquisition Introduction Acquisition…

Edition
1st edition
ISBN/ISSN
9781597499620
Collation
xii, 239 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FIC n
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics for handheld devices
Comment Share
Doherty, Eamon P

Table of contents: 1. Preface 2. Disclaimer 3. Author 4. The cell phone 5. Digital camera forensics 6. The PDAs and digital forensics 7. GPS devices 8. Corporate investigations on a netbook 9. Cell phone investigations by police 10. Recovering existing or deleted data from USB devices 11. Places to work at investigating mobile devices 12. References 13. …

Edition
--
ISBN/ISSN
9781439898772
Collation
xxvii, 303 hal.; ilus.; 27 cm
Series Title
--
Call Number
363.25 DOH d
Availability1
Add to basket
MARC DownloadCite
cover
Guide to computer forensics and investigations
Comment Share
Steuart, ChristopherNelson, BillPhillips, Amelia

Table of Contents 1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. …

Edition
Fourth Edition
ISBN/ISSN
9781435498839
Collation
xxv, 682 hal.; ilus.; 24 cm + 1 DVD-ROM
Series Title
--
Call Number
005.8 NEL g
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?