pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: SYSTEM FORENSICS, INVESTIGATION, AND RESPONSE
By: John R. Vacca, K. Rudolph
Format: Paperback

List price: £76.99


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 0763791342
ISBN 13: 9780763791346
Publisher: JONES AND BARTLETT PUBLISHERS, INC
Pub. date: 22 September, 2010
Pages: 339
Synopsis: PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field.
Publication: US
Imprint: Jones and Bartlett Publishers, Inc
Returns: Returnable
Some other items by this author:
BARGAINING POWER EFFECTS IN FINANCIAL CONTRACTING (PB)
BETWEEN COMPLIANCE AND CONFLICT (HB)
BETWEEN COMPLIANCE AND CONFLICT (PB)
BIOMETRIC TECHNOLOGIES AND VERIFICATION SYSTEMS
BIOMETRIC TECHNOLOGIES AND VERIFICATION SYSTEMS (PB)
CLOUD COMPUTING SECURITY
CLOUD COMPUTING SECURITY
CLOUD COMPUTING SECURITY
CLOUD COMPUTING SECURITY (HB)
COMPUTER AND INFORMATION SECURITY HANDBOOK
COMPUTER AND INFORMATION SECURITY HANDBOOK
COMPUTER AND INFORMATION SECURITY HANDBOOK (HB)
COMPUTER AND INFORMATION SECURITY HANDBOOK (HB)
COMPUTER AND INFORMATION SECURITY HANDBOOK (HB)
COMPUTER FORENSICS (PB)
COMPUTER FORENSICS JUMPSTART
COMPUTER FORENSICS JUMPSTART
COMPUTER FORENSICS JUMPSTART
COMPUTER FORENSICS JUMPSTART (PB)
COMPUTER FORENSICS: COMPUTER CRIME SCENE INVESTIGATION (PB)
CYBER SECURITY AND IT INFRASTRUCTURE PROTECTION (PB)
ELECTRONIC COMMERCE
ELECTRONIC COMMERCE (PB)
FIREWALLS (PB)
FRIENDS IN THE BEDROOM BUT STRANGERS IN CHURCH: THE SATANIC SEDUCTION OF SEXUALITY INFILTRATING GOD'S CHURCH
FRIENDS IN THE BEDROOM BUT STRANGERS IN CHURCH: THE SATANIC SEDUCTION OF SEXUALITY INFILTRATING GOD'S CHURCH (HB)
GAME THEORY APPLICATIONS IN NETWORK DESIGN (HB)
GETTING STARTED WITH FLEX 3
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (HB)
GUIDE TO DISASTER RECOVERY (PB)
GUIDE TO WIRELESS NETWORK SECURITY (HB)
GUIDE TO WIRELESS NETWORK SECURITY (PB)
HANDBOOK OF SENSOR NETWORKING
HANDBOOK OF SENSOR NETWORKING (HB)
HIGH-SPEED CISCO NETWORKS
HIGH-SPEED CISCO NETWORKS (PB)
HOLOGRAM & HOLOGRAPHY
HVDC TRANSMISSION (HB)
I-MODE CRASH COURSE (PB)
IDENTITY THEFT (HB)
IDENTITY THEFT (PB)
IEL LABOUR LAW IN SOUTH KOREA (PB)
INFORMATION WARFARE (PB)
INTRACRANIAL ATHEROSCLEROSIS (HB)
LABYRINTHS MOSCOW BANK (HB)
LABYRINTHS MOSCOW BANK (PB)
MANAGING INFORMATION SECURITY
MANAGING INFORMATION SECURITY (PB)
MEMORY, RECONCILIATION, AND REUNIONS IN SOUTH KOREA
MONOGRAPHS ON INVERTEBRATE TAXONOMY (HB)
NANOTECHNOLOGY (HB)
NETWORK AND SYSTEM SECURITY
NETWORK AND SYSTEM SECURITY (PB)
NETWORK SECURITY, FIREWALLS, AND VPNS (PB)
NUCLEAR FUSION AND WASTE (HB)
OFFICIAL NETSCAPE DEVELOPER'S GUIDE TO APPFOUNDRY TOOLS
OPTICAL NETWORKING BEST PRACTICES HANDBOOK
OPTICAL NETWORKING BEST PRACTICES HANDBOOK
OPTICAL NETWORKING BEST PRACTICES HANDBOOK (HB)
PRACTICAL INTERNET SECURITY (HB)
PRACTICAL INTERNET SECURITY (PB)
PSEUDOMONAS SYRINGAE PATHOVARS AND RELATED PATHOGENS (HB)
PSEUDOMONAS SYRINGAE PATHOVARS AND RELATED PATHOGENS (PB)
PUBLIC KEY INFRASTRUCTURE
PUBLIC KEY INFRASTRUCTURE
PUBLIC KEY INFRASTRUCTURE
PUBLIC KEY INFRASTRUCTURE
PUBLIC KEY INFRASTRUCTURE
PUBLIC KEY INFRASTRUCTURE
PUBLIC KEY INFRASTRUCTURE (HB)
READING, WRITING, AND DISCUSSING AT THE GRADUATE LEVEL
ROUTER INSTALLATION FIELD MANUAL (PB)
SECURITY IN THE PRIVATE CLOUD
SECURITY IN THE PRIVATE CLOUD
SECURITY IN THE PRIVATE CLOUD
SECURITY IN THE PRIVATE CLOUD (HB)
SECURITY POLICIES AND IMPLEMENTATION ISSUES (PB)
SHAMAN SORCERESS (PB)
SINGING LIKE A CRICKET, HOOTING LIKE AN OWL
SOLVING URBAN INFRASTRUCTURE PROBLEMS USING SMART CITY TECHNOLOGIES
THE BUSINESS CASE FOR NETWORK DISASTER RECOVERY PLANNING (PB)
THE CABLING HANDBOOK (HB)
THE CABLING HANDBOOK (PB)
THE MASTER MAGICKAL BIBLE (PB)
THE POLITICS OF MORAL SIN
THEMATIC DEVELOPMENT OF SCHUBERT'S LAST PIANO SONATA, D. 960 (FIRST MOVEMENT) (PB)
TRANSPORT LAW IN SOUTH KOREA (PB)
WIRELESS DATA DEMYSTIFIED (PB)
WORLD''S 15 GREATEST PROBLEMS IN ASTRONOMY (HB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
Web Application Security ()
O''Reilly Media
Our Price : £38.68
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket