Forensic course development
暂无分享,去创建一个
[1] Ed Tittel,et al. Scene of the cybercrime : computer forensics handbook , 2002 .
[2] Jack Koziol. Intrusion Detection with Snort , 2003 .
[3] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[4] Rafeeq Ur Rehman,et al. Intrusion Detection with SNORT (Bruce Perens' Open Source Series): Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID , 2003 .
[5] Henry B. Wolfe. Encountering Encrypted Evidence (potential) , 2002 .
[6] Eugene Schultz,et al. Incident Response: A Strategic Guide to Handling System and Network Security Breaches , 2001 .
[7] Donald L. Pipkin. Halting the Hacker , 2002 .
[8] Stephen Northcutt,et al. Network intrusion detection , 2003 .
[9] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[10] Timothy P. Kosiba. Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2003 .
[11] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[12] Donald L. Pipkin. Halting the Hacker: A Practical Guide to Computer Security , 1996 .
[13] Berni Dwan. Halting the hacker: A practical guide to computer security , 1997 .
[14] Eoghan Casey Bs Ma. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet , 2000 .
[15] Albert Marcella,et al. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , 2002 .
[16] Edward Skoudis. Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses , 2001 .