Computer Forensics InfoSec Pro Guide

Computer Forensics InfoSec Pro Guide

3.82 (17 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?


Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.
You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource.
Computer Forensics: InfoSec Pro Guide features:Lingo-Common security terms defined so that you're in the know on the job
IMHO-Frank and relevant opinions based on the author's years of industry experience
Budget Note-Tips for getting security technologies and processes into your organization's budget
In Actual Practice-Exceptions to the rules of security explained in real-world contexts
Your Plan-Customizable checklists you can use on the job now
Into Action-Tips on how, why, and when to apply new skills and techniques at work
show more

Product details

  • Paperback | 344 pages
  • 185.42 x 228.6 x 17.78mm | 521.63g
  • McGraw-Hill Education - Europe
  • MCGRAW-HILL Professional
  • United States
  • English
  • ill
  • 007174245X
  • 9780071742450
  • 512,856

About David Cowen

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics.
show more

Table of contents

Part I: Getting Started Chapter 1 What is Computer Forensics? Chapter 2 Learning Computer Forensics Chapter 3 Making a Lab Part II: Your First Investigation Chapter 4 How To Approach a Computer Forensics Investigation Chapter 5 Choosing Your Procedures Chapter 6 Testing Your Tools Chapter 7 Live Forensics vs. Post Mortem Forensics Chapter 8 Capturing Evidence Chapter 9 Nontraditional Forensics Part III: Case Examples, How to Work a Case Chapter 10 How to Know What Kind of Investigation You Are Entering Chapter 11 HR Cases Chapter 12 Adminstrator Abuse Chapter 13 Stealing Information Chapter 14 Internal Leaks Chapter 15 Keyloggers and Malware Part IV: Defending Your Work Chapter 16 Documenting Your Findings Chapter 17 Different Types of Reports Chapter 18 Explaining Your Work Part V: The Legal Side Chapter 19 Litigation and the Computer Forensic Examiner Chapter 20 What Type of Witness Are You? Chapter 21 Writing Reports For Court Chapter 22 Creating Exhibits Glossary
show more

Rating details

17 ratings
3.82 out of 5 stars
5 18% (3)
4 47% (8)
3 35% (6)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X