Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Forensics: Computer Crime Scene Investigation (Networking Series)

Buy
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book’s companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.

KEY FEATURES

• Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks

• Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter

• CD includes tools, presentations, and demos of the latest computer forensics software

Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verifi cation; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms

On the CD-ROM (See Appendix G for Details) Includes a collection of forensic tools, demonstrations, docs, product presentations, and figures from the book. Topics and demos include: analysis tools, data recovery, forensic examination checklists, instant messenger issues, litigation, forensic training and certification information, case profiles, and more

SYSTEM REQUIREMENTS The third party software contained on the CD-ROM runs on a variety of platforms and operating systems. Please consult Appendix G for more details, and especially Web site information for specific requirements, updates, etc. Minimum system requirements for all of these software products include Adobe Acrobat 5.0 or higher, Windows 2000, XP; an Internet connection; some also require basic hardware such as Firewire, USB Devices, Zip, Jaz, Floppy Diskettes, or hard disk drives (IDE, EIDE, SCSI, ATA, SATA).

KEY FEATURES - Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods and services - Discusses data seizure and analysis, preservation of computer evidence, reconstruction of events and information warfare - Case studies and vignettes of actual computer crimes are used - CD includes demos of the latest computer forensics and auditing software

About the Author

John Vacca is an experienced author and security official. He served with NASA as a computer security official and has over twenty books on computer-related topics to his credit.

(HTML tags aren't allowed.)

Implementing VMware Horizon View 5.2
Implementing VMware Horizon View 5.2

VMware Horizon View helps you simplify desktop and application management while increasing security and control. This book will introduce you to all of the components of the VMware Horizon View suite, walk you through their deployment, and show how they are used. We will also discuss how to assess your virtual desktop resource requirements,...

Optimal Resource Allocation for Distributed Video Communication (Multimedia Computing, Communication and Intelligence)
Optimal Resource Allocation for Distributed Video Communication (Multimedia Computing, Communication and Intelligence)

While most books on the subject focus on resource allocation in just one type of network, this book is the first to examine the common characteristics of multiple distributed video communication systems. Comprehensive and systematic, Optimal Resource Allocation for Distributed Video Communication presents a unified...

Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Get ready to be an effective digital leader, influencer, disruptor, and catalyst for change in the digital world!

As a leader you need to constantly evolve to achieve sustained success. The world is being transformed by Digital. The pace of change is constantly accelerating and volatility and complexity are the
...

Glow Discharge Plasmas in Analytical Spectroscopy
Glow Discharge Plasmas in Analytical Spectroscopy

This multi-author, edited volume includes chapters which deal with both basic and highly complex applications. Glow discharge devices are now being used in very novel ways for the analysis of liquids and gases, including molecular species detection and identification, an area that was beyond the perceived scope of applicability just ten years...

Differential Equations and Control Theory
Differential Equations and Control Theory
This volume is based on papers presented at the International Workshop on Differential Equations and Optimal Control, held at the Department of Mathematics of Ohio University in Athens, Ohio. The main objective of this international meeting was to feature new trends in the theory and applications of partial differential and functional-differential...
Pro Silverlight for the Enterprise (Books for Professionals by Professionals)
Pro Silverlight for the Enterprise (Books for Professionals by Professionals)

Microsoft Silverlight 2 is a new development platform designed to make the development of Rich Internet Applications (RIAs) far easier than has previously been possible. Pro Silverlight for the Enterprise addresses the question of how you can bring Silverlight 2 to your company to provide rich Internet experiences that will interface...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy