Operating system forensic analysis.
Files, email messages, and social media posts all contain valuable information for digital forensic investigators when searching for evidence of a crime or intrusions into a computer system or network, but there's also a wealth of information to be gleaned from a computer's operating syste...
Saved in:
Online Access: |
Streaming Video (via O'Reilly/Safari) |
---|---|
Format: | Electronic Video |
Language: | English |
Published: |
[Place of publication not identified] :
O'Reilly Media, Inc.,
[2017]
|
Edition: | [First edition]. |
Subjects: |
Internet
Streaming Video (via O'Reilly/Safari)Online
Call Number: |
HV8079.C65
|
---|---|
HV8079.C65 | Available |