000 01536cam a22002178i 4500
005 20251223133302.0
008 240606s2024 nju o 001 0 eng c
020 _a9781394256105
020 _a9781394256112
041 _aeng
082 0 0 _a364.16/8
100 1 _aJakobsen, Adam Tilmar,
245 1 0 _aPractical cyber intelligence :
_ba hands-on guide to digital forensics /
_cAdam Tilmar Jakobsen.
300 _a1 online resource
500 _aIncludes index.
520 _a"Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."--
650 0 _aComputer crimes
_xInvestigation.
650 0 _aCyber intelligence (Computer security)
856 _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=10896970
942 _cEBK
999 _c7842
_d7842