• Guide to Computer Forensics and Investigations See large image

    Guide to Computer Forensics and Investigations (Mixed media product) By (author) Bill Nelson, By (author) Amelia Phillips, By (author) Christopher Steuart

    $85.89 - Save $13.04 13% off - RRP $98.93 Free delivery worldwide Available
    Dispatched in 2 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionLearners will master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, "Guide to Computer Forensics and Investigations". This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections. Learn how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. The book features free downloads of the latest forensic software, so readers can become familiar with the tools of the trade.


Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for Guide to Computer Forensics and Investigations

    Title
    Guide to Computer Forensics and Investigations
    Authors and contributors
    By (author) Bill Nelson, By (author) Amelia Phillips, By (author) Christopher Steuart
    Physical properties
    Format: Mixed media product
    Number of pages: 720
    Width: 185 mm
    Height: 231 mm
    Thickness: 41 mm
    Weight: 1,225 g
    Language
    English
    ISBN
    ISBN 13: 9781435498839
    ISBN 10: 1435498836
    Classifications

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Academic Level: 03
    LC classification: QA
    B&T Modifier: Text Format: 06
    B&T Merchandise Category: STX
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    Abridged Dewey: 005
    BIC subject category V2: URY
    B&T Approval Code: A93663050
    BISAC V2.8: COM053000
    DC22: 005.8
    Ingram Subject Code: XE
    BISAC V2.8: COM043050
    B&T Approval Code: A93663052
    Thema V1.0: URY
    Edition
    4, Revised
    Edition statement
    4th Revised edition
    Publisher
    Cengage Learning, Inc
    Imprint name
    Delmar Cengage Learning
    Publication date
    28 October 2009
    Publication City/Country
    Clifton Park
    Review quote
    1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. 10: Recovering Graphics Files. 11: Virtual Machines, Network Forensics, and Live Acquisitions. 12: E-mail Investigations. 13: Cell Phone and Mobile Device Forensics. 14: Report Writing for High-Tech Investigations. 15: Expert Testimony in High-Tech Investigations. 16: Ethics and High-Tech Investigations. Appendix A: Certification and Testing Processes for Computer Forensics. Appendix B: ComputerForensics References. Appendix C: Computer Forensics Lab Configuration. Appendix D: DOS-Based Computer Forensics Tools.
    Table of contents
    1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. 10: Recovering Graphics Files. 11: Virtual Machines, Network Forensics, and Live Acquisitions. 12: E-mail Investigations. 13: Cell Phone and Mobile Device Forensics. 14: Report Writing for High-Tech Investigations. 15: Expert Testimony in High-Tech Investigations. 16: Ethics and High-Tech Investigations. Appendix A: Certification and Testing Processes for Computer Forensics. Appendix B: ComputerForensics References. Appendix C: Computer Forensics Lab Configuration. Appendix D: DOS-Based Computer Forensics Tools.