intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Computer crimes

Xem 1-20 trên 77 kết quả Computer crimes
  • Ebook "Forensic computer crime investigation" includes contents: Chapter 1: computer crime and the electronic crime scene; chapter 2: the digital investigative unit: staffing, training, and issues; chapter 3: criminal investigation analysis and behavior: characteristics of computer criminals; chapter 4: investigative strategy and utilities; chapter 5: computer forensics & investigation: the training organization; chapter 6: internet crimes against children; chapter 7: challenges to digital forensic evidence; chapter 8: strategic aspects in international forensics; chapter 9: cyber terrorism...

    pdf338p longtimenosee05 31-03-2024 3 0   Download

  • Ebook "Investigating computer-related crime: Handbook for corporate investigators" includes contents: Section 1 - the nature of cyber crime, section 2 - investigating cyber crime, section 3 - preparing for cyber crime, section 4 - using the forensic utilities, appendix a - introduction to denial of service attacks, appendix b - technical report 540-96.

    pdf295p longtimenosee05 31-03-2024 3 0   Download

  • In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.

    pdf196p longtimenosee05 31-03-2024 0 0   Download

  • In this part, the following content will be discussed: Chapter 1: the initial contact, chapter 2: client site arrival, chapter 3: evidence collection procedures, chapter 4: evidence collection and analysis tools, chapter 5: password recovery, chapter 6: questions and answers by subject area, chapter 7: recommended reference materials, chapter 8: case study.

    pdf132p longtimenosee05 31-03-2024 3 0   Download

  • In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.

    pdf199p longtimenosee05 31-03-2024 2 0   Download

  • Continued part 1, part 2 of ebook "Fraud auditing and forensic accounting (4th edition)" provides readers with contents including: fraud detection; fraud response; computer crime; fraud and the accounting information system; gathering evidence; cyber forensics; obtaining and evaluating nonfinancial evidence in a fraud examination;...

    pdf173p tuongnhuoclan 27-11-2023 6 4   Download

  • Ebook A guide to computer network security part 1 includes contents: Chapter 1 computer network fundamentals; chapter 2 understanding computer network security; chapter 3 security threats to computer networks; chapter 4 computer network vulnerabilities; chapter 5 cyber crimes and hackers; chapter 6 hostile scripts; chapter 7 security assessment, analysis, and assurance.

    pdf187p haojiubujain06 05-09-2023 6 3   Download

  • Ebook Computer network security part 1 includes contents: Chapter 1 computer network fundamentals; chapter 2 understanding network security; chapter 3 security threats to computer networks; chapter 4 computer network vulnerabilities; chapter 5 cyber crimes and hackers; chapter 6 hostile scripts; chapter 7 security assessment, analysis, and assurance; chapter 8 access control and authorization; chapter 9 authentication; chapter 10 cryptography.

    pdf300p haojiubujain06 05-09-2023 6 3   Download

  • Ebook Cyber warfare and cyber terrorism: Part 2 includes contents: Section IV technical aspects of handling cyber attacks; section V identification, authorization, and access control; section VI business continuity; section VII cyber warfare and cyber terrorism: national and international responses.

    pdf307p haojiubujain06 05-09-2023 8 2   Download

  • Ebook Cyber warfare and cyber terrorism: Part 1 includes contents: Introduction to cyber warfare and cyber terrorism; section I terms, concepts, and definitions; section II dynamic aspects of cyber warfare and cyber terrorism; section III human aspects of cyber warfare and cyber terrorism.

    pdf258p haojiubujain06 05-09-2023 5 1   Download

  • Ebook The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy includes contents: Chapter 1 what is penetration testing? chapter 2 reconnaissance, chapter 3 scanning, chapter 4 exploitation, chapter 5 web-based exploitation, chapter 6 maintaining access with backdoors and rootkits, chapter 7 wrapping up the penetration test.

    pdf178p haojiubujain06 06-09-2023 5 3   Download

  • Ebook Wireless security handbook: Part 1 includes contents: Chapter 1 wireless network overview, chapter 2 risks and threats of wireless, chapter 3 the legality of computer crime, chapter 4 wireless physical layer technologies, chapter 5 wireless management frames, chapter 6 wireless local and personal area networks, chapter 7 wide area wireless technologies, chapter 8 wireless antenna theory.

    pdf138p haojiubujain06 06-09-2023 8 4   Download

  • Ebook Gift of fire: Social, legal and ethical issues for computing technology (4th edition) - Part 2 presents the following content: Chapter 5 crime; chapter 7 evaluating and controlling technology; chapter 8 errors, failures, and risks; chapter 9 professional ethics and responsibilities.

    pdf248p runthenight09 06-05-2023 8 4   Download

  • Ebook Investigating computer-related crime: Handbook for corporate investigators - Part 2 presents the following content: Chapter 10 - handling the crime in progress, chapter 11 - "it never happened" - cover-ups are common, chapter 12 - involving the authorities, chapter 13 - when an investigation can't continue, chapter 14 - building a corporate cyber "SWAT Team", chapter 15 - privacy and computer crime, chapter 16 - preserving evidence - basic concepts, chapter 17 - collecting evidence - first steps, chapter 18 - searching for hidden information, chapter 19 - handling floppy disks.

    pdf116p runthenight08 12-04-2023 12 4   Download

  • Ebook Investigating computer-related crime: Handbook for corporate investigators - Part 1 presents the following content: Chapter 1 - cyber crime as we enter the twenty-first century, chapter 2 - the potential impacts of cyber crime, chapter 3 - rogue code attacks, chapter 4 - surgical strikes and shotgun blasts, chapter 5 - a framework for conducting an investigation for a computer security incident, chapter 6 - look for the hidden flaw, chapter 7 - analyzing the remnants of a computer security incident, chapter 8 - launching the investigation, chapter 9 - determining if a crime has taken ...

    pdf179p runthenight08 12-04-2023 6 3   Download

  • Ebook Information security management handbook (Sixth edition, Volume 6): Part 2 include of the following content: Domain 6 security architecture and design: principles of computer and network organizations, architectures, and designs; domain 7 operations security: operations controls; domain 8 business continuity and disaster recovery planning; domain 9 legal, regulations, compliance, and investigations: major categories of computer crime; domain 10 physical (environmental) security: elements of physical security.

    pdf231p runthenight03 07-12-2022 14 6   Download

  • Continued part 1, part 2 of ebook "Ethical and social issues in the information age (Fifth edition)" provide readers with content about: software issues - risks and liabilities; computer crimes; new frontiers for computer ethics - artificial intelligence; new frontiers for computer ethics - virtualization and virtual reality; new frontiers for computer ethics - cyberspace;... Please refer to the part 2 of ebook for details!

    pdf208p duonghoanglacnhi 07-11-2022 9 3   Download

  • Chapter 5 Processing crime and incident scenes of the lecture introduces content such as explain the rules for digital evidence, explain guidelines for processing law enforcement crime scenes, list the steps in preparing for an evidence search, describe how to secure a computer incident or crime scene.

    pdf91p lavender2022 22-04-2022 14 4   Download

  • Lecture Introduction to computing - Lesson 39: Cyber crime. After studying this lesson, you will to find out about several types of crimes that occur over cyber space; to familiarize ourselves with with several methods that can be used to minimize the ill effects of those crimes;...

    pdf53p hanthienngao 15-04-2022 14 3   Download

  • The followings will be discussed in ebook Guide to computer network security - Part 1: Computer network fundamentals, computer network security fundamentals, security threats and threat motives to computer networks, introduction to computer network vulnerabilities, cyber crimes and hackers, scripting and security in computer networks and web browsers, disaster management, access control and authorization,...

    pdf289p lovebychance04 20-05-2021 27 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2