Beställningsvara. Skickas inom 5-8 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to: Prepare for and conduct computer forensics investigationsFind and filter dataProtect personal privacyTransfer evidence without contaminating itAnticipate legal loopholes and opponents’ methodsHandle passwords and encrypted dataWork with the courts and win the casePlus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Linda Volonino (PhD, MBA, CISSP, ACFE) is a computer forensic investigator and expert witness with Robson Forensic, Inc. and a member of InfraGard. Reynaldo Anzaldua (MBA, CISSP, EnCE, CHFI, IBM I-Series) teaches computer forensics and information security at South Texas College and works with private organizations and government agencies.
Introduction 1 Part I: Digging Out and Documenting Electronic Evidence 7Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away — Until Revelation Day 9Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation 23Chapter 3: Getting Authorized to Search and Seize 39Chapter 4: Documenting and Managing the Crime Scene 55Part II: Preparing to Crack the Case 71Chapter 5: Minding and Finding the Loopholes 73Chapter 6: Acquiring and Authenticating E-Evidence 95Chapter 7: Examining E-Evidence 117Chapter 8: Extracting Hidden Data 135Part III: Doing Computer Forensic Investigations 151Chapter 9: E-Mail and Web Forensics 153Chapter 10: Data Forensics 175Chapter 11: Document Forensics 201Chapter 12: Mobile Forensics 219Chapter 13: Network Forensics 241Chapter 14: Investigating X-Files: eXotic Forensics 265Part IV: Succeeding in Court 275Chapter 15: Holding Up Your End at Pretrial 277Chapter 16: Winning a Case Before You Go to Court 287Chapter 17: Standing Your Ground in Court 295Part V: The Part of Tens 311Chapter 18: Ten Ways to Get Qualifi ed and Prepped for Success 313Chapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness 319Chapter 20: Ten Cool Tools for Computer Forensics 325Glossary 331Index 345