Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 32 from your keywords: subject="investigation"
First Page Previous 1 2 3 4 Next Last Page
cover
Scene of the cybercrime
Comment Share
Cross, Michael

Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…

Edition
2nd Edition
ISBN/ISSN
9781597492768
Collation
iv, 732 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.8 CRO s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber crime investigations : bridging the gaps between security professionals…
Comment Share
Reyes, AnthonyBrittson, RichardO'Shea, KevinSteel, Jim

Table of contents Chapter 1: Introduction: The Problem at Hand Chapter 2: "Computer Crime" discussed Chapter 3: Preparing for prosecution and testifying Chapter 4: Cyber Investigative Roles Chapter 5: Incident Response: live forensics and investigrations Chapter 6: Legal issues of intercepting WIFI transmissions Chapter 7: Seizure of digital information Chapter 8: Conducting Cyber Inv…

Edition
--
ISBN/ISSN
9781597491334
Collation
xix, 412 hal.; ilus.; 23 cm
Series Title
--
Call Number
363.23 REY c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber crime and cyber terrorism investigator's handbook
Comment Share
Akhgar, BabakStaniforth, AndrewBosco, Francesca M.

Table of Contents Chapter 1: Cyberspace: The new frontier for policing? Abstract The Shape of the Challenge The Size of the Challenge The Response Conclusion Chapter 2: Definitions of Cyber Terrorism Abstract Introduction The Confusion About Cyber Terrorism Cyber Terrorism Definition Has Cyber Terrorism Ever Occurred? Conclusions …

Edition
--
ISBN/ISSN
9780128007433
Collation
xxiii, 282 hal.; ilus.; 24 cm
Series Title
--
Call Number
R363.23 AKH c
Availability1
Add to basket
MARC DownloadCite
cover
The best damn cybercrime and digital forensics book period
Comment Share
Reyes, AnthonyCardwell, KevinWiles, Jack

Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/​electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…

Edition
--
ISBN/ISSN
9781597492287
Collation
xxxv, 699 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.23 REY b
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics and incident response: a practical guide to deploying digit…
Comment Share
Johansen, Gerard

Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…

Edition
--
ISBN/ISSN
9781787288683
Collation
v, 308 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOH d
Availability1
Add to basket
MARC DownloadCite
cover
Steganography Forensic: metadata analysis for steganography detection
Comment Share
Muhammad Nur Al-Azhar

Contents Chapter 1 Indroduction Chapter 2 Literature background on steganography Chapter 3 Research methodology Chapter 4 Steganography samples Chapter 5 Steganalysis approach for steganography detection Chapter 6 Metadata analysis approach for steganography detection Chapter 7 Conclusions Chapter 8 Recommendations for further work

Edition
--
ISBN/ISSN
9783330004597
Collation
ix, 136 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.82 AL- s
Availability1
Add to basket
MARC DownloadCite
cover
Virtualization and forensics: a digital forensic investigator's guide to virt…
Comment Share
Barret, DianeKipper, Gregory

Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…

Edition
--
ISBN/ISSN
9781597495578
Collation
xvii, 253 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAR v
Availability1
Add to basket
MARC DownloadCite
cover
Network forensics: tracking hackers through cyberspace
Comment Share
Davidoff, SherriHam, Jonathan

Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…

Edition
--
ISBN/ISSN
9780132564717
Collation
xxvi, 545 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV n
Availability1
Add to basket
MARC DownloadCite
cover
Computer incident response and forensics team management: conducting a succes…
Comment Share
Jhonson III, Leighton R.

Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…

Edition
--
ISBN/ISSN
9781597499965
Collation
xiii, 333 hal.; ilus.; 24cm
Series Title
--
Call Number
658.4 JOH c
Availability1
Add to basket
MARC DownloadCite
cover
CyberForensics Understanding Information Security Investigation
Comment Share
Jennifer Bayuk

1 Introduction 1 Jennifer Bayuk 2 The Complex World of Corporate CyberForensics Investigations 7 Gregory Leibolt 3 Investigating Large-Scale Data Breach Cases 29 J Andrew Valentine 4 Insider Threat Investigations 45 Shane Sims 5 Accounting Forensics 53 Tracy McBride 6 Analyzing Malicious Software 59 Lenny Zeltser 7 Network Packet Forensics 85 Eddie Schwartz 8 RAM and File …

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 BAY c
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?