The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecti
Computer forensics: investigating wireless networks and devices
โ Scribed by EC-Council Press
- Publisher
- EC-Council;Course Technology Cengage Learning
- Year
- 2010
- Tongue
- English
- Leaves
- 117
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Investigating wireless attacks -- PDA forensics -- iPod and iPhone forensics -- BlackBerry forensics.
โฆ Table of Contents
Investigating wireless attacks --
PDA forensics --
iPod and iPhone forensics --
BlackBerry forensics.
โฆ Subjects
Computer crimes--Investigation--Examinations;Computer security--Examinations;Criminal investigation--Examinations;Electronic evidence;Hackers;Study guides;Computer crimes -- Investigation -- Examinations -- Study guides;Criminal investigation -- Examinations -- Study guides;Computer security -- Examinations -- Study guides;Computer security -- Examinations
๐ SIMILAR VOLUMES
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecti
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecti
Covering the fundamental theory together with the state of the art in research and development, this practical guide provides the techniques needed to design, analyze, and optimize device-to-device (D2D) communications in wireless networking. With an ever-increasing demand for higher data rate wirel
Covering the fundamental theory together with the state of the art in research and development, this practical guide provides the techniques needed to design, analyze, and optimize device-to-device (D2D) communications in wireless networking. With an ever-increasing demand for higher data rate wirel
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firew