Ebook Cyber crime investigators field guide: Part 2
Số trang: 199
Loại file: pdf
Dung lượng: 2.24 MB
Lượt xem: 22
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.
Nội dung trích xuất từ tài liệu:
Ebook Cyber crime investigators field guide: Part 2
Nội dung trích xuất từ tài liệu:
Ebook Cyber crime investigators field guide: Part 2
Tìm kiếm theo từ khóa liên quan:
Computer security Computer networks Security measures Cyber crime Cyber crime investigators Linux commands Attack signaturesTài liệu có liên quan:
-
Ebook Simple computer security: Disinfect your PC – Part 1
131 trang 141 0 0 -
Ebook The Database hacker's handbook: Defending database servers – Part 1
280 trang 140 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 2
226 trang 133 0 0 -
Ebook Protecting your library's digital sources: the essential guide to planning and preservation
121 trang 112 0 0 -
Lecture Computer networks: Lesson 34 - Hammad Khalid Khan
18 trang 54 0 0 -
Ebook Information security fundamentals: Part 2
144 trang 53 0 0 -
Ebook Security power tools: Part 2
505 trang 53 0 0 -
Ebook E-business and e-commerce management: Strategy, implementation and practice - Part 2
514 trang 53 0 0 -
Ebook Security power tools: Part 1
353 trang 51 0 0 -
Ebook Security in wireless mesh networks: Part 1
357 trang 50 0 0