Introduction to security and network forensics / William J. Buchanan.
Material type:
- 9780849335686
- QA 76.9.A25 .B83 2011

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC QA 76.9.A25 .B83 2011 c.2 (Browse shelf(Opens below)) | c.2 | Available | NULIB000008360 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9.A25 .A54 2019 c.2 Foundations of information security : a straightforward introduction / | GC QA 76.9.A25 .B63 2022 Learn wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using wireshark / | GC QA 76.9.A25 .B83 2011 c.1 Introduction to security and network forensics / | GC QA 76.9.A25 .B83 2011 c.2 Introduction to security and network forensics / | GC QA 76.9.A25 .C35 2021 Nmap network exploration and security auditing cookbook / | GC QA 76.9.A25 .D86 2020 Mastering windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats / | GC QA 76.9.A25 .H37 2019 Digital forensics basics : a practical guide using Windows OS / |
Includes bibliographical references and index.
Introduction to security -- Intrusion detection systems -- Encryption -- Authentication, hashing, and digital certificates -- Enhanced software security -- Network security elements -- Introduction to risk -- Threat analysis -- Network forensics -- Data hiding and obfuscation -- Web infastructures -- Cloud/Grid computing -- Appendix A.
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles in computer security and digital forensics, those tasked with safeguarding our most private information will be lost in a turbulent and shifting sea. Providing such an introductory text, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics.
There are no comments on this title.