Details

Computer Forensics JumpStart


Computer Forensics JumpStart


2. Aufl.

von: Michael G. Solomon, K. Rudolph, Ed Tittel, Neil Broom, Diane Barrett

19,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 16.02.2011
ISBN/EAN: 9781118067659
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Essential reading for launching a career in computer forensics</b> <p>Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.</p> <ul> <li>Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crime</li> <li>Details the ways to conduct a computer forensics investigation</li> <li>Highlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witness</li> <li>Walks you through identifying, collecting, and preserving computer evidence</li> <li>Explains how to understand encryption and examine encryption files</li> </ul> <p><i>Computer Forensics JumpStart</i> is the resource you need to launch a career in computer forensics.</p>
Introduction. <p>Chapter 1 The Need for Computer Forensics.</p> <p>Chapter 2 Preparation—What to Do Before You Start.</p> <p>Chapter 3 Computer Evidence.</p> <p>Chapter 4 Common Tasks.</p> <p>Chapter 5 Capturing the Data Image.</p> <p>Chapter 6 Extracting Information from Data.</p> <p>Chapter 7 Passwords and Encryption.</p> <p>Chapter 8 Common Forensic Tools.</p> <p>Chapter 9 Pulling It All Together.</p> <p>Chapter 10 How to Testify in Court.</p> <p>Appendix A Answers to Review Questions.</p> <p>Appendix B Forensic Resources.</p> <p>Appendix C Forensic Certifications and More.</p> <p>Appendix D Forensic Tools 289</p> <p>Glossary.</p> <p>Index.</p>
<b>Michael G. Solomon</b>, CISM, CISSP, PMP, GSEC, is a full-time security speaker, consultant, trainer, and project manager who specializes in development and assessment security topics. An IT professional since 1987, he has worked on projects or done training for more than 60 major companies and organizations, including EarthLink, Schumacher, Nike, and others. <p><b>K Rudolph</b>, CISSP, is founder and President of Native Intelligence, which provides security training for federal agencies and commercial firms. She is a featured speaker at national conferences and a board member of Federal Information Systems Security Educators' Association.</p> <p><b>Ed Tittel</b> is a 28-year computer industry veteran with over 130 books to his credit. He writes regularly for sites such as InformIT.com and TechTarget.</p> <p><b>Neil Broom</b>, CCE, CISSP, CFE, is President and Laboratory Director of Technical Resource Center, Inc. in Atlanta, Georgia. He has more than 15 years of experience providing investigative, technical, educational, and security services.</p> <p><b>Diane Barrett</b> is a forensic trainer for Paraben. Holding many industry certifications including CISSP, ISSMP, and DCFP, she has been involved in the IT industry for almost 20 years and has been active in education, security, and forensics for the past 10 years.</p>
<b>Launch Your Computer Forensics Career—Quickly and Effectively</b> <p>Written by a team of computer forensic experts, the new edition of this popular guide has been extensively updated to cover the latest tools, practices, and core information you need to launch a career in this rapidly growing field. Inside, you'll learn:</p> <ul> <li> <p>What skills you need to become an effective investigator</p> </li> <li> <p>Things to consider before you start investigating a scene</p> </li> <li> <p>How to identify, collect, and preserve computer evidence</p> </li> <li> <p>The trick to finding hidden data and extracting information from it</p> </li> <li> <p>Common forensic tools and the latest on passwords and encryption</p> </li> <li> <p>How to present computer evidence in court as an expert witness</p> </li> <li> <p>Which professional certifications are available and what you need to do</p> </li> </ul> <p>In-Depth Coverage for Anyone Considering a Career in Computer Forensics</p> <p>A Valuable Reference and Resource for Those Already in the Industry</p> <p>Practical Information on Professional Certifications in Computer Forensics</p>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €