Operating system forensic analysis.

Files, email messages, and social media posts all contain valuable information for digital forensic investigators when searching for evidence of a crime or intrusions into a computer system or network, but there's also a wealth of information to be gleaned from a computer's operating syste...

Full description

Saved in:
Bibliographic Details
Online Access: Streaming Video (via O'Reilly/Safari)
Format: Electronic Video
Language:English
Published: [Place of publication not identified] : O'Reilly Media, Inc., [2017]
Edition:[First edition].
Subjects:

Internet

Streaming Video (via O'Reilly/Safari)

Online

Holdings details from Online
Call Number: HV8079.C65
HV8079.C65 Available