Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Forensic psychology 210
- Psicología 186
- Psychology 181
- Psicología legal 180
- Computer security 165
- Security measures 154
- Medicina legal 136
- Computer networks 121
- Computer crimes 107
- Derecho 96
- Investigation 88
- Psiquiatría forense 81
- Psicología forense 80
- Forensic sciences 79
- Derecho procesal 72
- Anuarios 70
- Oratoria forense 58
- Derecho Civil 41
- Examinations 38
- Medical jurisprudence 38
- Law 34
- Criminología 33
- Derecho civil 33
- Práctica forense 33
- Psicología criminal 32
- Historia 30
- Forensic Medicine 29
- Psychological aspects 29
- Criminal investigation 28
- Abogados 27
-
2761Publicado 2021“…Yet many of the scientific, legal, and ethical concepts that underpin forensic DNA evidence remain unclear to the general public, judges, prosecutors, defense attorneys and students of law, forensic sciences, ethics, and genetics. …”
Libro -
2762Publicado 2015“…Digital Archaeology: The Art and Science of Digital Forensics LiveLessons is a comprehensive video guide to the techniques and processes used to perform forensic investigations on information systems. …”
-
2763Publicado 2021“…This book is not a handbook of criminology and forensic medicine but rather a tool that reviews socio-historical and scientific data and notes of methodology based on the different sciences aimed at the study of crime in all its many facets (sociology, jurisprudence, criminalistics, psychology, forensic neuroscience, and forensic medicine). …”
Libro electrónico -
2764
-
2765Publicado 2014Tabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 ASPECTOS BÁSICOS -- 1.1 TAREAS DEL ADMINISTRADOR -- 1.2 HARDWARE DEL SERVIDOR -- 1.2.1 CPD -- 1.2.2 Sistema de rack -- 1.2.3 Servidores -- 1.2.4 Sistemas RAID -- 1.3 SOFTWARE DEL SERVIDOR -- 2 REDES DE ORDENADORES -- 2.1 CABLEADO -- 2.2 DISPOSITIVOS DE INTERCONEXIÓN -- 2.3 DIRECCIONAMIENTO IP -- 2.3.1 Clases de direcciones -- 2.3.2 Direcciones específicas -- 2.3.3 Direcciones privadas -- 2.3.4 Subredes -- 2.4 CONFIGURACIÓN DE ROUTERS -- 2.4.1 Tablas de enrutado -- 2.4.2 Ejemplo de creación de una tabla de enrutado -- 3 SERVICIOS -- 3.1 INTRODUCCIÓN -- 3.2 SERVICIO DHCP -- 3.3 SERVICIO DNS -- 3.3.1 Espacio de nombres de dominio -- 3.3.2 Registrar un dominio -- 3.3.3 Tipos de registro -- 3.4 SERVICIO FTP -- 3.5 SERVICIO WEB -- 3.5 SERVICIO WEB -- 3.6 SERVICIO DE CORREO ELECTRÓNICO -- 3.7 SERVICIO DE ACCESO REMOTO -- 4 SEGURIDAD -- 4.1 LAS DIEZ LEYES INMUTABLES DE LA SEGURIDAD -- 4.2 CONCEPTOS BÁSICOS SOBRE SEGURIDAD -- 4.2.1 Amenazas de seguridad -- 4.2.2 Ataques pasivos -- 4.2.3 Ataques activos -- 4.2.4 Tipos de ataques -- 4.3 OBTENCIÓN DE INFORMACIÓN DE UN ATACANTE -- 4.3.1 Identificar los servicios TCP y UDP -- 4.3.2 Identificar el sistema operativo -- 4.3.3 Identificar las versiones de los servicios -- 4.3.4 Escaneo de vulnerabilidades -- 4.4 MEDIDAS DE SEGURIDAD EN LOS SISTEMAS -- 4.4.1 Prevención -- 4.4.2 Detección: sistemas de detección de intrusos -- 4.4.3 Colocación de un NIDS -- 4.4.4 Tipos de sistemas de detección de intrusos -- 4.4.5 Recuperación: copias de seguridad -- 4.4.6 Técnicas de análisis forense -- WINDOWS 2008 R2 -- 5 INSTALACIÓN Y CONFIGURACIÓN -- 5.1 PREPARACIÓN DEL SISTEMA -- 5.1.1 Primeros pasos -- 5.1.2 Instalación -- 5.1.3 Finalización de la instalación y configuración -- 5.2 AGREGAR O QUITAR FUNCIONES (...)…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
2766Publicado 2018Tabla de Contenidos: “…9.4.3 Writing rules -- 9.4.4 Using predefined rule-sets -- 9.5 Finding intrusions in system-call audit logs -- 9.5.1 The execution vulnerability -- 9.5.2 Catching fraudulent executions -- 9.5.3 Monitoring the filesystem -- 9.5.4 Monitoring the impossible -- 9.6 Trusting humans to detect anomalies -- Summary -- Chapter 10: The Caribbean breach: a case study in incident response -- 10.1 The Caribbean breach -- 10.2 Identification -- 10.3 Containment -- 10.4 Eradication -- 10.4.1 Capturing digital forensics artifacts in AWS -- 10.4.2 Outbound IDS filtering -- 10.4.3 Hunting IOCs with MIG -- 10.5 Recovery -- 10.6 Lessons learned and the benefits of preparation -- Summary -- Part 3: Maturing DevOps security -- Chapter 11: Assessing risks -- 11.1 What is risk management? …”
Libro electrónico -
2767por Stapleton, JeffTabla de Contenidos: “…8.1.1 Offline Root CA -- 8.1.2 Online Intermediate CA With Issuing CAs -- 8.1.3 Online Issuing CA -- 8.1.4 Online RA -- 8.1.5 Online CRL Service -- 8.1.6 Online OCSP Service -- 8.1.7 End User's Machine -- 8.2 PKI Incident Attack Actions -- 8.2.1 Private Key Compromise -- 8.2.2 Private Key Access -- 8.2.3 Limited Access to the Private Key -- 8.2.4 Other Attacks -- 8.3 PKI Incident Response Plan -- 8.4 Monitoring the PKI Environment Prior to an Incident -- 8.5 Initial Response to an Incident -- 8.6 Detailed Discovery of an Incident -- 8.7 Collection of Forensic Evidence -- 8.8 Reporting of an Incident -- Notes -- Chapter 9 PKI Governance, Risk, and Compliance -- 9.1 PKI Governance -- 9.1.1 Management Organization -- 9.1.2 Security Organization -- 9.1.3 Audit Organization -- 9.2 PKI Risks -- 9.3 Cryptography Risks -- 9.3.1 Algorithm Issues -- 9.3.2 Protocol Issues -- 9.3.3 Product Issues -- 9.4 Cybersecurity Risks -- 9.5 Operational Risks -- 9.5.1 Monitoring -- 9.5.2 Capacity -- 9.5.3 Continuity -- 9.5.4 Resources -- 9.5.5 Knowledge -- 9.6 PKI Compliance -- 9.6.1 Evaluation Criteria -- 9.6.2 Gap Assessment -- 9.6.3 Audit Process -- 9.7 PKI Risk Assessment -- 9.8 PKI Cloud Assessment -- Notes -- Chapter 10 PKI Industry -- 10.1 ITU-T X.509 -- 10.2 EMV Integrated Circuit Card (ICC) -- 10.3 ASC X9 PKI Standards -- 10.4 Secure Electronic Transactions (SET) -- 10.5 Secure Socket Layer (SSL) -- 10.6 PKI Forum -- 10.7 American Bar Association (ABA) -- 10.8 WebTrust CA -- 10.9 CA Browser Forum -- 10.10 Cloud Security Alliance (CSA) -- 10.11 NIST PQC Program -- 10.12 ASC X9 Financial PKI -- 10.12.1 X9 Financial PKI Origins -- 10.12.2 PKI Architecture Models -- 10.12.3 X9 Financial PKI Program -- Notes -- Bibliography -- B.1 ASC X9 Financial Services -- B.2 European Telecommunication Standards Institute (ETSI) -- B.3 Internet Engineering Task Force (IETF)…”
Publicado 2024
Libro electrónico -
2768Publicado 2018“…The text will be indispensable for SIDS researchers, SIDS organisations, paediatric pathologists, forensic pathologists, paediatricians and families, in addition to residents in training programs that involve paediatrics. …”
Libro electrónico -
2769por Dorpat, Theodore L.“…This groundbreaking book by an award-winning psychoanalyst and forensic psychiatrist presents a comprehensive exploration of a timely but often taboo topic: the failure of punishment to deter crime and violence, an issue that affects us both individually and as a culture. …”
Publicado 2007
Libro electrónico -
2770
-
2771Publicado 2017“…The second group of papers deals with forensic or analytical toxicology topics such as simplified methods for the analysis of gaseous toxic agents, rapid methods for the analysis and monitoring of pathogens in drinking water and water-based solutions, as well as the linkages between clinical and forensic toxicology. …”
Libro electrónico -
2772Publicado 2024“…The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. …”
Libro electrónico -
2773
-
2774Publicado 2023“…Over the last decades, interest in forensic toxicology has continually increased. Consequently, the discipline assumed a leading role, becoming one of the reference sciences for elucidating events of judicial importance. …”
Libro electrónico -
2775Publicado 2020“…The field of psychology is closely linked to legal processes, from forensic evaluation to treatment of offenders, through treatment with victims or risk assessment. …”
Libro electrónico -
2776Publicado 2017“…He has decades of information security experience and is the author of dozens of O'Reilly titles on info sec and digital forensics, including "Introduction to Penetration Testing" and "Learning Linux Security". …”
-
2777Publicado 2022Tabla de Contenidos: “…EL SESGO DE CONFIRMACIÓN FORENSE -- 4.4. REMEDIOS -- 5. BIBLIOGRAFÍA -- UNA NUEVA ERA: HACIA EL ROBOT SANITARIO "AUTÓNOMO" Y SU ENCAJE EN EL DERECHO1 -- 1. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2778por Tyagi, Amit KumarTabla de Contenidos: “…4.11 An Open Discussion -- 4.12 Conclusion -- References -- Chapter 5 Artificial Intelligence for Cyber Security: Current Trends and Future Challenges -- 5.1 Introduction: Security and Its Types -- 5.1.1 Human Aspects of Information Security -- 5.2 Network and Information Security for Industry 4.0 and Society 5.0 -- 5.2.1 Industry 4.0 vs Society 5.0 -- 5.2.2 Industry 4.0 to Society 5.0 -- 5.3 Internet Monitoring, Espionage, and Surveillance -- 5.4 Cyber Forensics with Artificial Intelligence and without Artificial Intelligence -- 5.5 Intrusion Detection and Prevention Systems Using Artificial Intelligence -- 5.6 Homomorphic Encryption and Cryptographic Obfuscation -- 5.7 Artificial Intelligence Security as Adversarial Machine Learning -- 5.8 Post-Quantum Cryptography -- 5.9 Security and Privacy in Online Social Networks and Other Sectors -- 5.10 Security and Privacy Using Artificial Intelligence in Future Applications/Smart Applications -- 5.11 Security Management and Security Operations Using Artificial Intelligence for Society 5.0 and Industry 4.0 -- 5.11.1 Implementation on the Internet of Things and Protecting Data in IoT Connected Devices -- 5.12 Digital Trust and Reputation Using Artificial Intelligence -- 5.13 Human-Centric Cyber Security Solutions -- 5.14 Artificial Intelligence-Based Cyber Security Technologies and Solutions -- 5.15 Open Issues, Challenges, and New Horizons Towards Artificial Intelligence and Cyber Security -- 5.15.1 An Overview of Cyber-Security -- 5.15.2 The Role of Artificial Intelligence in Cyber Security -- 5.15.3 AI Is Continually Made Smarter -- 5.15.4 AI Never Misses a Day of Work -- 5.15.5 AI Swiftly Spots the Threats -- 5.15.6 Impact of AI on Cyber Security -- 5.15.7 AI in Cyber Security Case Study -- 5.16 Future Research with Artificial Intelligence and Cyber Security -- 5.17 Conclusion -- References…”
Publicado 2024
Libro electrónico -
2779Publicado 2011“…It covers all major aspects of the pathologic anatomy of childhood disorders ranging from chromosomal syndromes and neoplasms to forensic pathology. Sections are organized by disease classification and by organ system. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2780