Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Real-world incidents
Introduction to the incident response process
Preparing for incident response
After detection of an incident
Live Data Collection from Windows systems
Live data collection from Unix systems
Forensic duplication
Collecting network-based evidence
Evidence handling
Computer system storage fundamentals
Data analysis techniques
Investigating Windows systems
Investigating Unix systems
Analyzing network traffic
Investigating hacker tools
Investigating routers
Writing computer forensic reports
Appendixes.

Browse Subjects

Show more subjects...

Statistics

from
to
Export