CART

(0) items

Computer Forensics JumpStart,9780470931660

Computer Forensics JumpStart

by ; ; ; ;
Edition:
2nd
ISBN13:

9780470931660

ISBN10:
0470931663
Format:
Paperback
Pub. Date:
3/15/2011
Publisher(s):
Sybex
List Price: $29.99

Rent Book

(Recommended)
 
Term
Due
Price
$16.49

Buy Used Book

In Stock Usually Ships in 24-48 Hours
U9780470931660
$19.49

Buy New Book

Currently Available, Usually Ships in 24-48 Hours
N9780470931660
$25.49

eBook

We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $13.23
See Prices

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 2nd edition with a publication date of 3/15/2011.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Used copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Summary

Due to the continuing rise of criminal conduct with technology, computer forensics is a rapidly growing discipline and one of the fastest growing segments of IT. If you are considering a career in this hot field, Computer Forensics JumpStart is for you. The second edition of an in-depth introduction to computer forensics, this major update covers the latest tools and practices as well as available certifications that can help you to launch a new career. Written by a team computer forensics experts, coverage includes: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data Capturing images Identifying, collecting, and preserving computer evidence Understanding encryption and examining encrypted files Documenting your case Evaluating common computer forensic tools Presenting computer evidence in court as an expert witness

Author Biography

Michael G. Solomon, CISM, CISSP, PMP, GSEC, is a full-time security speaker, consultant, trainer, and project manager who specializes in development and assessment security topics. An IT professional since 1987, he has worked on projects or done training for more than 60 major companies and organizations, including EarthLink, Schumacher, Nike, and others.

K Rudolph, CISSP, is founder and President of Native Intelligence, which provides security training for federal agencies and commercial firms. She is a featured speaker at national conferences and a board member of Federal Information Systems Security Educators' Association.

Ed Tittel is a 28-year computer industry veteran with over 130 books to his credit. He writes regularly for sites such as InformIT.com and TechTarget.

Neil Broom, CCE, CISSP, CFE, is President and Laboratory Director of Technical Resource Center, Inc. in Atlanta, Georgia. He has more than 15 years of experience providing investigative, technical, educational, and security services.

Diane Barrett is a forensic trainer for Paraben. Holding many industry certifications including CISSP, ISSMP, and DCFP, she has been involved in the IT industry for almost 20 years and has been active in education, security, and forensics for the past 10 years.

Table of Contents

Introduction.

Chapter 1 The Need for Computer Forensics.

Chapter 2 Preparation—What to Do Before You Start.

Chapter 3 Computer Evidence.

Chapter 4 Common Tasks.

Chapter 5 Capturing the Data Image.

Chapter 6 Extracting Information from Data.

Chapter 7 Passwords and Encryption.

Chapter 8 Common Forensic Tools.

Chapter 9 Pulling It All Together.

Chapter 10 How to Testify in Court.

Appendix A Answers to Review Questions.

Appendix B Forensic Resources.

Appendix C Forensic Certifications and More.

Appendix D Forensic Tools 289

Glossary.

Index.



Please wait while the item is added to your cart...