0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Not currently available

Hacking Exposed Computer Forensics - Secrets & Solutions (Electronic book text, 2nd Revised edition)
Hacking Exposed Computer Forensics - Secrets & Solutions (Electronic book text, 2nd Revised edition): Aaron Philipp
Hacking Exposed Computer Forensics - Secrets & Solutions (Electronic book text, 2nd Revised edition): Aaron Philipp

Share your images

Hacking Exposed Computer Forensics - Secrets & Solutions (Electronic book text, 2nd Revised edition)

Aaron Philipp

 (sign in to rate)

Bookmark and Share

We have no sources for this product at present. If you add this to your wishlist we will let you know should it become available to order.

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation

The latest strategies for investigating cyber-crime

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.Effectively uncover, capture, and prepare evidence for investigationStore and process collected data in a highly secure digital forensic labRestore deleted documents, partitions, user activities, and file systemsAnalyze evidence gathered from Windows, Linux, and Macintosh systemsUse the latest Web and client-based e-mail tools to extract relevant artifactsOvercome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devicesPrepare legal documents that will hold up to judicial and defense scrutiny

General

Imprint: McGraw-Hill Professional
Country of origin: United States
Release date: October 2009
Authors: Aaron Philipp
Format: Electronic book text
Pages: 656
Edition: 2nd Revised edition
ISBN-13: 978-0-07-162678-1
Barcode: 9780071626781
Categories: Promotions
Books > Computing & IT > Computer communications & networking > Network security
LSN: 0-07-162678-6

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Loyalty partners