Computer forensics : infosec pro guide / David Cowen
Material type:
- 9780071742450
- HV 8079.C65 .C69 2013

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC HV 8079.C65 .C69 2013 (Browse shelf(Opens below)) | c.1 | Available | NULIB000006722 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC HV 8079.C65 .B37 2010 c.1 Virtualization and forensics : a digital forensic investigator's guide to virtual environment / | GC HV 8079.C65 .B37 2010 c.2 Virtualization and forensics : a digital forensic investigator's guide to virtual environment / | GC HV 8079.C65 .C66 2010 Computer forensics : investigation procedures and response. | GC HV 8079.C65 .C69 2013 Computer forensics : infosec pro guide / | GC HV 8079.C65 .C667 2010 Computer forensics : investigating hard disks, file and operating systems. | GC HV 8079.C65 .D38 2012 c.1 Network forensics : tracking hackers through cyberspace / | GC HV 8079.C65 .D38 2012 c.2 Network forensics : tracking hackers through cyberspace / |
Includes bibliographical references and index.
PART I: Getting Started -- 1: What Is Computer Forensics? -- 2: Learning Computer Forensics -- 3: Creating a Lab -- PART II: Your First Investigation -- 4: How to Approach a Computer Forensics Investigation -- 5: Choosing Your Procedures -- 6: Testing Your Tools -- 7: Live vs. Postmortem Forensics -- 8: Capturing Evidence -- 9: Nontraditional Digital Forensics -- PART III: Case Examples: How to Work a Case -- 10: Establishing the Investigation Type and Criteria -- 11: Human Resources Cases -- 12: Administrator Abuse -- 13: Stealing Information -- 14: Internal Leaks --15: Keyloggers and Malware -- PART IV: Defining your work -- 16: Documenting Your Findings with Reports -- 17: Litigation and Reports for Court and Exhibits.
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources,
There are no comments on this title.