| 000 | 01536cam a22002178i 4500 | ||
|---|---|---|---|
| 005 | 20251223133302.0 | ||
| 008 | 240606s2024 nju o 001 0 eng c | ||
| 020 | _a9781394256105 | ||
| 020 | _a9781394256112 | ||
| 041 | _aeng | ||
| 082 | 0 | 0 | _a364.16/8 |
| 100 | 1 | _aJakobsen, Adam Tilmar, | |
| 245 | 1 | 0 |
_aPractical cyber intelligence : _ba hands-on guide to digital forensics / _cAdam Tilmar Jakobsen. |
| 300 | _a1 online resource | ||
| 500 | _aIncludes index. | ||
| 520 | _a"Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."-- | ||
| 650 | 0 |
_aComputer crimes _xInvestigation. |
|
| 650 | 0 | _aCyber intelligence (Computer security) | |
| 856 | _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=10896970 | ||
| 942 | _cEBK | ||
| 999 |
_c7842 _d7842 |
||