バックアップ
[
{
"title" : "Windows Forensics and Incident Recovery (Addison-Wesley Microsoft Technology Series)",
"isbn" : "0321200985",
"date" : "2005-10-02T15:40:29.000Z",
"publisher" : "Addison-Wesley Professional",
"authors" : "Harlan Carvey",
"categories" : "",
"score" : "",
"comment" : ""
},
{
"title" : "Real Digital Forensics: Computer Security and Incident Response",
"isbn" : "0321240693",
"date" : "2005-12-29T07:24:18.000Z",
"publisher" : "Addison-Wesley Professional",
"authors" : "Keith J. Jones, Richard Bejtlich, Curtis W. Rose",
"categories" : "",
"score" : "",
"comment" : ""
},
{
"title" : "Hacking Exposed Computer Forensics: Computer Forensics Secrets \u0026 Solutions",
"isbn" : "0072256753",
"date" : "2005-10-02T15:46:12.000Z",
"publisher" : "McGraw-Hill Osborne Media",
"authors" : "Chris Davis, Aaron Philipp, David Cowen",
"categories" : "",
"score" : "",
"comment" : ""
},
{
"title" : "The Tao of Network Security Monitoring: Beyond Intrusion Detection",
"isbn" : "0321246772",
"date" : "2005-10-02T15:38:55.000Z",
"publisher" : "Addison-Wesley Professional",
"authors" : "Richard Bejtlich",
"categories" : "",
"score" : "",
"comment" : ""
},
{
"title" : "Design and Implementation of the FreeBSD Operating System, The",
"isbn" : "0201702452",
"date" : "2005-10-02T15:54:44.000Z",
"publisher" : "Addison-Wesley Professional",
"authors" : "Marshall Kirk Neville-Neil, George V. McKusick",
"categories" : "",
"score" : "",
"comment" : ""
},
{
"title" : "Extrusion Detection: Security Monitoring for Internal Intrusions",
"isbn" : "0321349962",
"date" : "2005-12-29T07:25:20.000Z",
"publisher" : "Addison-Wesley Professional",
"authors" : "Richard Bejtlich",
"categories" : "",
"score" : "",
"comment" : ""
}
]