Computer Forensics

Computer Forensics

4.11 - 1251 ratings - Source

Two leading computer cops show how to use computer forensics--methodical processes and techniques for collecting, sorting, and analyzing computer misuse. Aimed at cyber avengers, this book fills the gap between all the Internet security books and the contingency planning and recovery when an incident happens.People who accidentally lock themselves out of their cars expect that a parking lot attendant has access to a slim jim and can use ... Manual hostile code is malware that is used interactively under the direct control of a malicious human being.

Title:Computer Forensics
Author:Warren G. Kruse, Jay G. Heiser
Publisher:Addison-Wesley Professional - 2002


You Must CONTINUE and create a free account to access unlimited downloads & streaming