1. Computer Incident Response and Forensics Team Management :
Author: Leighton R. Johnson, III ; Mike Kessler, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Evidence, Criminal.,Forensic sciences.
Classification :
HV
8079
.
C65
.
J63
2014


2. Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response
Author: / Johnson, Leighton
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING (uncategorised)&COMPUTER SCIENCE
Classification :
E-BOOK

3. Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response
Author: Johnson, Leighton
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: BUSINESS, MANAGEMENT AND ECONOMICS

4. Computer incident response and forensics team management
Author: Leighton R. Johnson III ; technical editor, Mike Kessler
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Evidence, Criminal,Forensic sciences
Classification :
HV8079
.
C65
J637
2014


5. Computer incident response and forensics team management
Author: Leighton R. Johnson III ; technical editor, Mike Kessler
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Evidence, Criminal,Forensic sciences
Classification :
HV8079
.
C65
J637
2014


6. Computer incident response and forensics team management : conducting a successful incident response
Author: / Leighton Johnson
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING (uncategorised)&COMPUTER SCIENCE
Classification :
E-BOOK

7. Security controls evaluation, testing, and assessment handbook /
Author: Leighton Johnson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Government policy-- United States,Electronic government information-- Security measures-- United States,Information technology-- Security measures-- United States,Information technology-- United States-- Management,Risk management-- Government policy-- United States
Classification :
QA76
.
9
.
A25

