Books on the topic 'Digital forensics ; Visualisation ; Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 49 books for your research on the topic 'Digital forensics ; Visualisation ; Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Richard, Bejtlich, and Rose Curtis W, eds. Real digital forensics: Computer security and incident response. Addison-Wesley, 2005.
Find full textWiles, Jack. Techno security's guide to e-discovery and digital forensics. Syngress Publishing, 2007.
Find full textWiles, Jack. Techno security's guide to e-discovery and digital forensics. Syngress Publishing, 2007.
Find full textEoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Syngress, 2012.
Find full textGregory, Kipper, and ScienceDirect (Online service), eds. Virtualization and forensics: A digital forensic investigator's guide to virtual environments. Syngress/Elsevier, 2010.
Find full textSchperberg, Robert. Cybercrime: Incident response and digital forensics. Information Systems Audit and Control Association, 2005.
Find full textWindows registry forensics: Advanced digital forensic analysis of the Windows registry. Syngress, 2011.
Find full textInternational Workshop on Digital Forensics and Incident Analysis (2nd 2007 Karlovassi, Samos, Greece). Digital forensics and incident analysis: Second International annual Workshop on Digital Forensics and Incident Analysis : proceedings : WDFIA 2007 : 27-28 August, 2007, Karlovassi, Samos, Greece. IEEE Computer Society, 2007.
Find full textDigital forensics for network, Internet, and cloud computing: A forensic evidence guide for moving targets and data. Syngress, 2010.
Find full textPeterson, Gilbert. Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textInternational, Workshop on Digital Forensics and Incident Analysis (3rd 2008 Malaga Spain). Proceedings: Third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008. CPS, Conference Pub. Services, 2008.
Find full textInternational Workshop on Digital Forensics and Incident Analysis (3rd 2008 Malaga, Spain). Proceedings: Third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008. CPS, Conference Pub. Services, 2008.
Find full textDelp, Edward J. Media forensics and security: 19-21 January 2009, San Jose, California, USA. SPIE, 2009.
Find full textMemon, Nasir D. Media forensics and security II: 18-20 January 2010, San Jose, California, United States. SPIE, 2010.
Find full text(Society), SPIE, IS & T--the Society for Imaging Science and Technology, and Electronic Imaging Science and Technology Symposium (2012 : Burlingame, Calif.), eds. Media watermarking, security, and forensics 2012: 23-25 January 2012, Burlingame, California, United States. SPIE, 2012.
Find full textWeerasinghe, Dasun. Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Springer-Verlag Berlin Heidelberg, 2010.
Find full text(Society), SPIE, IS & T--the Society for Imaging Science and Technology, Digital Watermarking Alliance, and Electronic Imaging Science and Technology Symposium (2011 : San Jose, Calif.), eds. Media watermarking, security, and forensics III: 24-26 January 2011, San Francisco, California, United States. SPIE, 2011.
Find full textKatie, Strzempka, ed. iPhone and iOS forensics: Investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices. Syngress, 2011.
Find full textGladyshev, Pavel. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textGogolin, Greg. Digital Forensics Explained. Auerbach Publishers, Incorporated, 2012.
Find full textJones, Keith J., and Richard Bejtlich. Real Digital Forensics, Volume 2. Pearson Education, Limited, 2025.
Find full textDigital Forensics: Threatscape and Best Practices. Elsevier Science & Technology Books, 2015.
Find full textHandbook Of Electronic Security And Digital Forensics. World Scientific Publishing Company, 2010.
Find full textTechno security's guide to e-discovery and digital forensics. Syngress Publishing, 2007.
Find full textChen, Lei, Nhien-An Le-Khac, and Hassan Takabi. Security, Privacy, and Digital Forensics in the Cloud. Wiley & Sons, Incorporated, John, 2019.
Find full textSecurity, Privacy and Digital Forensics in the Cloud. Wiley & Sons (Asia) Pte Ltd Pacific, John, 2019.
Find full textChen, Lei, Nhien-An Le-Khac, and Hassan Takabi. Security, Privacy, and Digital Forensics in the Cloud. Wiley & Sons, Incorporated, John, 2019.
Find full textRay, Liu K. J., Trappe Wade, Wang Z. Jane, Wu Min, and Zhao Hong, eds. Multimedia fingerprinting forensics for traitor tracing. Hindawi Pub., 2005.
Find full textCybercrime Case Presentation Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects. Syngress Media,U.S., 2012.
Find full textTechno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook. Syngress, 2007.
Find full textWhat Every Engineer Should Know About Cyber Security And Digital Forensics. Taylor & Francis Inc, 2013.
Find full textMuniz, Joseph. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer. Cisco Press, 2018.
Find full textDigital Forensics and Investigations: People, Process, and Technologies to Defend the Enterprise. CRC Press, 2018.
Find full textChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Information Science Reference, 2010.
Find full textChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Information Science Reference, 2010.
Find full textWindows registry forensics: Advanced digital forensic analysis of the Windows registry. Syngress, 2016.
Find full textSlade, Robert. Software Forensics : Collecting Evidence from the Scene of a Digital Crime. McGraw-Hill Professional, 2004.
Find full textSoftware Forensics : Collecting Evidence from the Scene of a Digital Crime. McGraw-Hill Professional, 2004.
Find full textDigital Forensics And Cyber Crime First International Icst Conference Revised Selected Papers. Springer, 2010.
Find full textZhao, Hong, Min Wu, Wade Trappe, K. J. Ray Liu, and Jane Z. Wang. Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications) (Eurasip Signal Processing and Communications). Hindawi Publishing Corporation, 2005.
Find full textPeterson, Gilbert, and Sujeet Shenoi. Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers. Springer, 2012.
Find full textGladyshev, Pavel, and Marcus K. Rogers. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Springer, 2012.
Find full text(Editor), Andrew Blyth, and Iain Sutherland (Editor), eds. EC2ND 2006: Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis. Springer, 2007.
Find full textGladyshev, Pavel, and Marcus K. Rogers. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers ... and Telecommunications Engineering). Springer, 2012.
Find full text