Uttarakhand Open University
ผลงานที่ได้รับความนิยมสูงสุด
| ชื่อเรื่อง : Digital Forensic |
| คำอธิบาย : BLOCK I: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 EVOLUTION OF COMPUTER FORENSICS; 1.4 STAGES OF COMPUTER FORENSICS PROCESS; 1.5 BENEFITS OF COMPUTER FORENSICS; 1.6 USES OF COMPUTER FORENSICS; 1.7 OBJECTIVES OF COMPUTER FORENSICS; 1.8 ROLE OF FORENSICS INVESTIGATOR; 1.9 FORENSICS READINESS; 1.10 SUMMARY; 1.11 CHECK YOUR PROGRESS; 1.12 ANSWERS TO CHECK YOUR PROGRESS; 1.13 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION TO COMPUTER CRIME INVESTIGATION; 2.3 ASSESS THE SITUATION; 2.4 ACQUIRE THE DATA; 2.5 ANALYZE THE DATA; 2.6 REPORT THE INVESTIGATION; 2.7 SUMMARY; 2.8 CHECK YOUR PROGRESS; 2.9 ANSWERS TO CHECK YOUR PROGRESS; 2.10 MODEL QUESTIONS; 3.1 LEARNING OBJECTIVES; 3.2 DIGITAL EVIDENCE; 3.3 FIRST RESPONDER TOOLKIT; 3.4 ISSUES FACING COMPUTER FORENSICS; 3.5 TYPES OF INVESTIGATION; 3.6 TECHNIQUES OF DIGITAL FORENSICS; 3.7 SUMMARY; 3.8 CHECK YOUR PROGRESS; 3.9 ANSWERS TO CHECK YOUR PROGRESS; 3.10 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 HARD DISK DRIVE; 4.3 DETAILS OF INTERNAL STRUCTURE OF HDD; 4.4 THE BOOTING PROCESS; 4.5 FILE SYSTEM; 4.6 SUMMARY; 4.7 CHECK YOUR PROGRESS; 4.8 ANSWERS TO CHECK YOUR PROGRESS; 4.9 MODEL QUESTIONS; BLOCK II: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 RECOVERING DELETED FILES AND PARTITIONS; 1.4 MORE ABOUT RECOVERING LOST FILES/DATA; 1.5 SUMMARY; 1.6 CHECK YOUR PROGRESS; 1.7 ANSWERS TO CHECK YOUR PROGRESS; 1.8 FURTHER READINGS; 1.9 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 WINDOWS REGISTRY; 2.4 WINDOWS EVENT LOG FILE; 2.5 WINDOWS PASSWORD STORAGE; 2.6 APPLICATION PASSWORDS CRACKERS; 2.7 SUMMARY; 2.8 CHECK YOUR PROGRESS; 2.9 ANSWERS TO CHECK YOUR PROGRESS; 2.10 FURTHER READINGS; 3.1 LEARNING OBJECTIVES; 3.2 INTRODUCTION; 3.3 NETWORK COMPONENTS AND THEIR FORENSICS IMPORTANCE; 3.4 OSI; 3.5 FORENSICS INFORMATION FROM NETWORK; 3.6 LOG ANALYSIS; 3.7 FORENSICS TOOLS; 3.8 SUMMARY; 3.9 CHECK YOUR PROGRESS; 3.10 ANSWERS TO CHECK YOUR PROGRESS; 3.11 FURTHER READINGS; 3.12 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3WIRELESS FIDELTY (WI-FI)(802.11) ; 4.4 WIRELESS SECURITY; 4.5 WIRELESS ATTACKS DETECTION TECHNIQUES; 4.6 WIRELESS INTRUSION DETECTION SYSTEMS; 4.7 SUMMARY; 4.8 CHECK YOUR PROGRESS; 4.9 ANSWERS TO CHECK YOUR PROGRESS; 4.10 FURTHER READING; BLOCK III: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 TYPES OF WEB ATTACKS; 1.4 WEB ATTACK FORENSICS; 1.5 WEB APPLICATION FORENSICS TOOLS; 1.6 SUMMARY; 1.7 CHECK YOUR PROGRESS; 1.8 ANSWERS TO CHECK YOUR PROGRESS; 1.9 FURTHER READINGS; 1.10 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 EMAIL ATTACKS AND CRIMES; 2.4 PRIVACY IN EMAILS; 2.5 EMAIL FORENSICS; 2.6 EMAIL FORENSIC TOOLS; 2.7 SUMMARY; 2.8 CHECK YOUR PROGRESS; 2.9 ANSWERS TO CHECK YOUR PROGRESS; 2.10 MODEL QUESTIONS; 2.11 FURTHER READINGS; 3.1 LEARNING OBJECTIVES; 3.2 INTRODUCTION; 3.3 CHALLENGES IN MOBILE FORENSICS; 3.4 MOBILE COMMUNICATION; 3.5 EVIDENCES IN A MOBILE DEVICE; 3.6 MOBILE FORENSIC PROCESS; 3.7 FORENSIC ACQUISITION TOOLS; 3.8 SUMMARY; 3.9 CHECK YOUR PROGRESS; 3.10 ANSWERS TO CHECK YOUR PROGRESS; 3.11 FURTHER READINGS; 3.12 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 REPORT PREPARATION; 4.5 LEGAL ASPECTS OF COMPUTING; 4.6 SUMMARY; 4.7 CHECK YOUR PROGRESS; 4.8 ANSWERS TO CHECK YOUR PROGRESS; 4.9 FURTHER READINGS; 4.10 MODEL QUESTIONS |
| คำสำคัญ : Digital Forensic, Information System, Information Security, Post-Graduate Diploma in Cyber Security, Cyber Security, Information Communication Technology |
| ผู้สร้างสรรค์/ผู้แต่ง/เจ้าของผลงาน : Jeetendra Pande |
| เจ้าของผลงานร่วม : Ajay Prasad, Uttarakhand Open University, Commonwealth Educational Media Centre for Asia |
| สื่อสำหรับบุคคลประเภท : ครู / อาจารย์, นักเรียน / นักศึกษา, ทั่วไป, ผู้ปกครอง |
| ระดับชั้น : ปริญญาตรี , ปริญญาโท, ปริญญาเอก, การศึกษาตามอัธยาศัย |
| สาขาวิชาของสื่อ : วิทยาศาสตร์, การงานอาชีพและเทคโนโลยี |
| ลักษณะของสื่อ : Textbooks, หนังสือ |
ผลงานทั้งหมด
8
ผู้เข้าชม
4,313
ดาวน์โหลด
6,196
| ผลงานที่ได้รับความนิยมสูงสุด 5 อันดับ | |
|---|---|
| Digital Forensic | 946 |
| Information Security Assurance | 668 |
| Cyber Attacks and Counter Measures: User Perspective | 598 |
| Information System | 459 |
| Fundamentals of Information Security | 449 |
| ผลงาน 5 อันดับล่าสุด | |
|---|---|
| Advanced Cyber Security Techniques | 4 สิงหาคม 2561 |
| Digital Forensic | 4 สิงหาคม 2561 |
| Information Security Assurance | 4 สิงหาคม 2561 |
| Information System | 4 สิงหาคม 2561 |
| Information System | 4 สิงหาคม 2561 |
| ผลงานทั้งหมด | ||||
|---|---|---|---|---|
| # | ชื่อเรื่อง | ผู้เข้าชม | ดาวน์โหลด | # |
| 1 | Digital Forensic | 946 | 718 | |
| 2 | Information Security Assurance | 668 | 605 | |
| 3 | Cyber Attacks and Counter Measures: User Perspective | 598 | 385 | |
| 4 | Information System | 459 | 700 | |
| 5 | Fundamentals of Information Security | 449 | 1,844 | |
| 6 | Advanced Cyber Security Techniques | 361 | 1,061 | |
| 7 | Cyber Security Techniques | 271 | 300 | |
| 8 | Information System | 271 | 585 | |
คลังทรัพยากรการศึกษาแบบเปิด