INSPIRING FUTURES

Security and forensic computing: forensic computing.

Buchanan, William J (2011) Security and forensic computing: forensic computing. [Video]

[img] HTML
Download (557B)
    [img]
    Preview
    PDF
    Download (20MB) | Preview

      Abstract/Description

      7 FORENSIC COMPUTING 217
      7.1 Introduction 217
      7.2 Legal infrastructure 217
      7.3 Computer Forensics 218
      7.4 Is it true or not? 219
      7.5 Identity details 222
      7.6 One-time passwords (OTP) and two-factor authentication 223
      7.7 Collection 224
      7.8 Preservation 224
      7.9 Event log 225
      7.10 Data hiding 228
      7.11 Covert channels 228
      7.12 Tutorial 228
      7.13 Software Tutorial 229
      7.14 On-line Exercises 229
      7.15 NetworkSims exercises 229
      7.16 Chapter Lecture 229

      Item Type: Video
      Uncontrolled Keywords: Data security; forensic computing; covert channels; newtork logs; incident detection; analysis;
      University Divisions/Research Centres: Faculty of Engineering, Computing and Creative Industries > School of Computing
      Dewey Decimal Subjects: 000 Computer science, information & general works >
      000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
      Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
      Item ID: 4064
      Depositing User: Professor Bill Buchanan
      Date Deposited: 11 Jan 2011 13:39
      Last Modified: 12 Jul 2012 09:27
      URI: http://researchrepository.napier.ac.uk/id/eprint/4064

      Actions (login required)

      View Item

      Document Downloads

      More statistics for this item...

      Edinburgh Napier University is a registered Scottish charity. Registration number SC018373