Similar Items
-
Social engineering penetration testing : executing social engineering pen tests, assessments and defense /
by: Watson, Gavin, et al.
Published: (2014) -
Theoretical and experimental methods for defending against DDoS attacks /
by: Reza Khalifeh Soltanian, Mohammad, et al.
Published: (2016) -
A framework for implementing cloud based enterprise resource planning (ERP) in the transport business sector in Zimbabwe.
by: Bindi, Maxwel
Published: (2017) -
A framework for implementing mobile enterprise resource planning (m-ERP) system to improve healthcare services in Zimbabwe.
by: Jaravaza, Kefasi
Published: (2020) -
Social media security : leveraging social networking while mitigating risk /
by: Cross, Michael, 1965-
Published: (2013)
Windows registry forensics : advanced digital forensic analysis of the Windows registry /
The second edition provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one of a kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and v...
Saved in:
Main Author: | Carvey, Harlan A. (Author) |
---|---|
Format: | Book |
Language: | English |
Published: |
Amsterdam :
Elsevier,
2016.
|
Edition: | Second edition. |
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|