Hot Best Seller

Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions

Availability: Ready to download

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Compu Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny


Compare

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Compu Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny

47 review for Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions

  1. 5 out of 5

    Timo

    Limited value since most of the forensic examples where shown by using highly expensive forensic software. If you have access to commercial versions of EnCase or FTK then this book will be more useful and if not you might want to check out Digital Forensics with Open Source tools or Real Digital Forensics.

  2. 5 out of 5

    Takedown

    Great book if you want an idea of how computer forensics work. Just note things about legal stuff describe US system so this part may not applicable to you.

  3. 4 out of 5

    Jovany Agathe

  4. 5 out of 5

    Nazmul Ahmed Noyon

  5. 5 out of 5

    David Cowen

  6. 5 out of 5

    Sansan Tan

  7. 5 out of 5

    To

  8. 4 out of 5

    Paul Harper

  9. 5 out of 5

    Subhajit Das

  10. 5 out of 5

    Angela

  11. 5 out of 5

    Liviu

  12. 4 out of 5

    Claudiu.Gherghinoiu

  13. 5 out of 5

    Jim Motes

  14. 4 out of 5

    Darrell Brown

  15. 4 out of 5

    Astera

  16. 4 out of 5

    Chris Kasten

  17. 5 out of 5

    Lord

  18. 4 out of 5

    Daitona

  19. 4 out of 5

    Corey Knoettgen

  20. 5 out of 5

    Dean

  21. 4 out of 5

    Matthew Kunzman

  22. 4 out of 5

    Melissa

  23. 4 out of 5

    Arsiclaro Rodrigues

  24. 4 out of 5

    Dustin

  25. 4 out of 5

    Matias Altamiranda

  26. 4 out of 5

    Jonathan J

  27. 5 out of 5

    Tiffany Go

  28. 4 out of 5

    A. W.L Frauenhauf

  29. 4 out of 5

    Johnny

  30. 5 out of 5

    Sanjeev Mahajan

  31. 5 out of 5

    Sam Culley

  32. 4 out of 5

    Ahlam

  33. 4 out of 5

    Ben

  34. 5 out of 5

    Nukri

  35. 5 out of 5

    Cezar Popescu

  36. 5 out of 5

    Digital Forensics

  37. 5 out of 5

    Sarip

  38. 5 out of 5

    Brian Haddock

  39. 4 out of 5

    Hooba

  40. 4 out of 5

    Alex

  41. 4 out of 5

    Mark

  42. 5 out of 5

    Riana Elizabeth

  43. 4 out of 5

    Teresa Merklin

  44. 5 out of 5

    Cliff Young

  45. 5 out of 5

    Chris

  46. 4 out of 5

    Scott

  47. 4 out of 5

    Parekoy Utana

Add a review

Your email address will not be published. Required fields are marked *

Loading...