Learn Computer Forensics - 2nd edition : Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence (2ND)

個数:

Learn Computer Forensics - 2nd edition : Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence (2ND)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 434 p.
  • 言語 ENG
  • 商品コード 9781803238302
  • DDC分類 363.25968

Full Description

Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected

Key Features

Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully
Record the digital evidence collected and organize a forensic examination on it
Perform an assortment of Windows scientific examinations to analyze and overcome complex challenges

Book DescriptionComputer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.

This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process.

By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.What you will learn

Explore the investigative process, rules of evidence, legal process, and ethical guidelines
Understand the difference between sectors, clusters, volumes, and file slack
Validate forensic equipment, computer program, and examination methods
Create and validate forensically sterile media
Gain the ability to draw conclusions based on the exam discoveries
Record discoveries utilizing the technically correct terminology
Discover the limitations and guidelines for RAM Capture and its tools
Explore timeline analysis, media analysis, string searches, and recovery of deleted data

Who this book is forThis book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.

Contents

Table of Contents

Types of Computer-Based Investigations
The Forensic Analysis Process
Acquisition of Evidence
Computer Systems
Computer Investigation Process
Windows Artifact Analysis
RAM Memory Forensic Analysis
Email Forensics - Investigation Techniques
Internet Artifacts
Online Investigations
Networking Basics
Report Writing
Expert Witness Ethics
Assessments

最近チェックした商品