Pittman and Dave ShaverĬhapter 6 UNIX Forensic Analysis. 135 Eoghan Casey, Christopher Daywalt, and Andy JohnstonĬhapter 5 Windows Forensic Analysis. Schwerha IVĬhapter 4 Intrusion Investigation. Luehr, Jessica Reust Smith, and Joseph J. 1 Eoghan CaseyĬHAPTER 2 Forensic Analysis. You may also complete your request on-line via the Elsevier homepage (), by selecting “Customer Support” and then “Obtaining Permissions.” Library of Congress Cataloging-in-Publication Data Application Submitted British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 13: 978-0-12-374267-4 For all information on all Elsevier Academic Press publications visit our Web site at Printed in the United States of America 09 10 9 8 7 6 5 4 3 2 1Ĭontributors. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, E-mail: .uk. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |