Computer Forensics Infosec Pro Guide
35%
off

Computer Forensics Infosec Pro Guide

By (author) , By (author) , By (author)

US$26.00US$40.00

You save US$14.00

Free delivery worldwide

Available
Dispatched from the UK in 2 business days

When will my order arrive?

Description

Security Smarts for the Self-Guided IT Professional. You can find out how to excel in the field of computer forensics investigations. You can learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource. Computer Forensics: InfoSec Pro Guide features: Lingo-Common security terms defined so that you're in the know on the job; IMHO-Frank and relevant opinions based on the author's years of industry experience; Budget Note-Tips for getting security technologies and processes into your organization's budget; In Actual Practice-Exceptions to the rules of security explained in real-world contexts; Your Plan-Customizable checklists you can use on the job now; and Into Action-Tips on how, why, and when to apply new skills and techniques at work.

show more

Product details

  • Paperback | 344 pages
  • 185.42 x 228.6 x 17.78mm | 521.63g
  • McGraw-Hill Education - Europe
  • Osborne/McGraw-Hill
  • New York, United States
  • English
  • ill
  • 007174245X
  • 9780071742450
  • 405,323

About John Loveland

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics.

show more

Table of contents

Part I: Getting Started Chapter 1 What is Computer Forensics? Chapter 2 Learning Computer Forensics Chapter 3 Making a Lab Part II: Your First Investigation Chapter 4 How To Approach a Computer Forensics Investigation Chapter 5 Choosing Your Procedures Chapter 6 Testing Your Tools Chapter 7 Live Forensics vs. Post Mortem Forensics Chapter 8 Capturing Evidence Chapter 9 Nontraditional Forensics Part III: Case Examples, How to Work a Case Chapter 10 How to Know What Kind of Investigation You Are Entering Chapter 11 HR Cases Chapter 12 Adminstrator Abuse Chapter 13 Stealing Information Chapter 14 Internal Leaks Chapter 15 Keyloggers and Malware Part IV: Defending Your Work Chapter 16 Documenting Your Findings Chapter 17 Different Types of Reports Chapter 18 Explaining Your Work Part V: The Legal Side Chapter 19 Litigation and the Computer Forensic Examiner Chapter 20 What Type of Witness Are You? Chapter 21 Writing Reports For Court Chapter 22 Creating Exhibits Glossary

show more