Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 33 from your keywords: subject="Forensic"
First Page Previous 1 2 3 4 Next Last Page
cover
Hacking exposed computer forensics: secrets & solutions
Comment Share
Philipp, AaronCowen, DavidDavis, Chris

Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…

Edition
Second edition
ISBN/ISSN
9780071626774
Collation
xxiv, 518 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 PHI h
Availability1
Add to basket
MARC DownloadCite
cover
System forensics, investigation, and response
Comment Share
Vacca, John R.Rudolph, K.

Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…

Edition
--
ISBN/ISSN
9780763791346
Collation
xv, 339 hal.; ilus.; 24 cm
Series Title
Information systems security &​ assurance series
Call Number
363.25 VAC s
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics processing and procedures: meeting the requirements of ISO …
Comment Share
Watson, DavidJones, Andrew

Terdapat bibliografi dan indeks. Table of contents: 1 - Introduction 2 - Forensic Laboratory Accommodation 3 - Setting up the Forensic Laboratory 4 - The Forensic Laboratory Integrated Management System 5 - Risk Management 6 - Quality in the Forensic Laboratory 7 - IT Infrastructure 8 - Incident Response 9 - Case Processing 10 - Case Management 11 - Evidence Presentation 12 - Sec…

Edition
--
ISBN/ISSN
9781597497428
Collation
xxi, 857 hal.; ilus.; 28 cm
Series Title
--
Call Number
363.25 WAT d
Availability1
Add to basket
MARC DownloadCite
cover
Placing the suspect behind the keyboard: using digital forensics and investig…
Comment Share
Carvey, HarlanShavers, Brett

Table of Contents Chapter 1. Introduction Digital Evidence Collection Simple File Copying “Dead Box” Approaches “Live Box” Approaches Decision-Making FlowChart Preview/Triage SmartPhones and Cellular Devices Chapter 2. High Tech Interview Introduction The Main Goal of Questioning a Suspect The Line of Questions for Suspects Questions for Victims Questions for Network Adm…

Edition
--
ISBN/ISSN
9781597499859
Collation
xxii, 267 hal.; ilus.; 25 cm
Series Title
--
Call Number
363.25 SHA p
Availability1
Add to basket
MARC DownloadCite
cover
File system forensic analysis
Comment Share
Carrier, Brian

Table of contents: Digital investigation foundations Computer foundations Hard disk data acquisition Volume analysis PC-based partitions Server-based partitions Multiple disk volumes File system analysis FAT concepts and analysis FAT data structures NTFS concepts NTFS analysis …

Edition
--
ISBN/ISSN
9780321268174
Collation
xx, 569 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 CAR f
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics for handheld devices
Comment Share
Doherty, Eamon P

Table of contents: 1. Preface 2. Disclaimer 3. Author 4. The cell phone 5. Digital camera forensics 6. The PDAs and digital forensics 7. GPS devices 8. Corporate investigations on a netbook 9. Cell phone investigations by police 10. Recovering existing or deleted data from USB devices 11. Places to work at investigating mobile devices 12. References 13. …

Edition
--
ISBN/ISSN
9781439898772
Collation
xxvii, 303 hal.; ilus.; 27 cm
Series Title
--
Call Number
363.25 DOH d
Availability1
Add to basket
MARC DownloadCite
cover
Scene of the cybercrime
Comment Share
Cross, Michael

Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…

Edition
2nd Edition
ISBN/ISSN
9781597492768
Collation
iv, 732 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.8 CRO s
Availability1
Add to basket
MARC DownloadCite
cover
The best damn cybercrime and digital forensics book period
Comment Share
Reyes, AnthonyCardwell, KevinWiles, Jack

Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/​electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…

Edition
--
ISBN/ISSN
9781597492287
Collation
xxxv, 699 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.23 REY b
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics and incident response: a practical guide to deploying digit…
Comment Share
Johansen, Gerard

Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…

Edition
--
ISBN/ISSN
9781787288683
Collation
v, 308 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOH d
Availability1
Add to basket
MARC DownloadCite
cover
Virtualization and forensics: a digital forensic investigator's guide to virt…
Comment Share
Barret, DianeKipper, Gregory

Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…

Edition
--
ISBN/ISSN
9781597495578
Collation
xvii, 253 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAR v
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?