0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (3)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback): Brett Shavers, John... Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback)
Brett Shavers, John Bair
R1,175 Discovery Miles 11 750 Ships in 12 - 17 working days

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

X-Ways Forensics Practitioner's Guide (Paperback, New): Brett Shavers, Eric Zimmerman X-Ways Forensics Practitioner's Guide (Paperback, New)
Brett Shavers, Eric Zimmerman
R1,247 Discovery Miles 12 470 Ships in 12 - 17 working days

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis.

In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches.

With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documented features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
Provides detailed explanations of the complete forensic investigation processe using X-Ways Forensics.Goes beyond the basics: hands-on case demonstrations of never-before-documented features of X-Ways.Provides the best resource of hands-on information to use X-Ways Forensics.

Placing the Suspect Behind the Keyboard - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects... Placing the Suspect Behind the Keyboard - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects (Paperback, New)
Brett Shavers
R1,181 Discovery Miles 11 810 Ships in 12 - 17 working days

"Placing the Suspect Behind the Keyboard" is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

Learn the tools and investigative principles of both physical and digital cybercrime investigations-and how they fit together to build a solid and complete case.

Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard."

The only book to combine physical and digital investigative techniques. "

Cybercrime Case Presentation - An Excerpt from Placing The Suspect Behind The Keyboard (Paperback, Abridged edition): Brett... Cybercrime Case Presentation - An Excerpt from Placing The Suspect Behind The Keyboard (Paperback, Abridged edition)
Brett Shavers
R596 Discovery Miles 5 960 Ships in 10 - 15 working days

"Cybercrime Case Presentation "is a "first look" excerpt from Brett Shavers' new Syngress book, "Placing the Suspect Behind the Keyboard. "Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they observed the case as it happened.

Cybercrime Investigation Case Studies - An Excerpt from Placing the Suspect Behind the Keyboard (Paperback, 1 Ed): Brett Shavers Cybercrime Investigation Case Studies - An Excerpt from Placing the Suspect Behind the Keyboard (Paperback, 1 Ed)
Brett Shavers
R607 Discovery Miles 6 070 Ships in 10 - 15 working days

"Cybercrime Investigation Case Studies "is a "first look" excerpt from Brett Shavers' new Syngress book, "Placing the Suspect Behind the Keyboard. "Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.

Cybercrime Investigative Case Management - An Excerpt from Placing the Suspect Behind the Keyboard (Paperback, New): Brett... Cybercrime Investigative Case Management - An Excerpt from Placing the Suspect Behind the Keyboard (Paperback, New)
Brett Shavers
R596 Discovery Miles 5 960 Ships in 10 - 15 working days

"Investigative Case Management "is a "first look" excerpted from Brett Shavers' new Syngress book, "Placing the Suspect Behind the Keyboard. "Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Financial Accounting - An Introduction
Jacqui Kew Paperback R623 Discovery Miles 6 230
Complete Adult Cat Food (3kg)
R215 R185 Discovery Miles 1 850
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Workplace law
John Grogan Paperback R900 R820 Discovery Miles 8 200
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010
6mm Yoga Mat & Carry Bag [Blue]
R191 Discovery Miles 1 910
Homequip USB Rehargeable Table Top…
R445 Discovery Miles 4 450
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R249 Discovery Miles 2 490
Mission Impossible 7 - Dead Reckoning…
Tom Cruise Blu-ray disc R571 Discovery Miles 5 710
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R256 R222 Discovery Miles 2 220

 

Partners