eBooks-it.org Logo
eBooks-IT.org Inner Image

Computer Forensics

Investigating Hard Disks, File and Operating Systems

Computer Forensics Image

Book Details:

Publisher:Delmar Cengage Learning
Series: Course Technology
Author:EC-Council
Edition:1
ISBN-10:1435483502
ISBN-13:9781435483507
Pages:250
Published:Apr 08 2009
Posted:Mar 23 2017
Language:English
Book format:PDF
Book size:10.28 MB

Book Description:

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. Hard Disks, File and Operating Systems provides a basic understanding of file systems, hard disks and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers are all discussed.

Download Link:

Related Books:

Hacking Exposed Computer Forensics

Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics Image
2nd Edition
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData CorporationThe latest strategies for investigating cyber-crimeIdentify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensi...

Computer Forensics

Computer Crime Scene Investigation
Computer Forensics Image
2nd Edition
Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes en...

Computer Forensics

A Pocket Guide
Computer Forensics Image
How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required....

Scene of the Cybercrime

Computer Forensics Handbook
Scene of the Cybercrime Image
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related secu...



2007 - 2021 © eBooks-IT.org