TY - BOOK AU - Cowen, David TI - Computer forensics: infosec pro guide SN - 9780071742450 AV - HV 8079.C65 .C69 2013 PY - 2013/// CY - New York PB - McGraw Hill Education KW - COMPUTER CRIMES -- INVESTIGATION N1 - Includes bibliographical references and index; PART I: Getting Started -- 1: What Is Computer Forensics? -- 2: Learning Computer Forensics -- 3: Creating a Lab -- PART II: Your First Investigation -- 4: How to Approach a Computer Forensics Investigation -- 5: Choosing Your Procedures -- 6: Testing Your Tools -- 7: Live vs. Postmortem Forensics -- 8: Capturing Evidence -- 9: Nontraditional Digital Forensics -- PART III: Case Examples: How to Work a Case -- 10: Establishing the Investigation Type and Criteria -- 11: Human Resources Cases -- 12: Administrator Abuse -- 13: Stealing Information -- 14: Internal Leaks --15: Keyloggers and Malware -- PART IV: Defining your work -- 16: Documenting Your Findings with Reports -- 17: Litigation and Reports for Court and Exhibits N2 - Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources ER -