Computer Forensics JumpStart

by ; ; ; ;
  • ISBN13:


  • ISBN10:


  • Edition: 2nd
  • Format: Paperback
  • Copyright: 3/15/2011
  • Publisher: Sybex
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.99 Save up to $9.84
  • Buy New


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.


Due to the continuing rise of criminal conduct with technology, computer forensics is a rapidly growing discipline and one of the fastest growing segments of IT. If you are considering a career in this hot field, Computer Forensics JumpStart is for you. The second edition of an in-depth introduction to computer forensics, this major update covers the latest tools and practices as well as available certifications that can help you to launch a new career. Written by a team computer forensics experts, coverage includes: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data Capturing images Identifying, collecting, and preserving computer evidence Understanding encryption and examining encrypted files Documenting your case Evaluating common computer forensic tools Presenting computer evidence in court as an expert witness

Author Biography

Michael G. Solomon, CISM, CISSP, PMP, GSEC, is a full-time security speaker, consultant, trainer, and project manager who specializes in development and assessment security topics. An IT professional since 1987, he has worked on projects or done training for more than 60 major companies and organizations, including EarthLink, Schumacher, Nike, and others.

K Rudolph, CISSP, is founder and President of Native Intelligence, which provides security training for federal agencies and commercial firms. She is a featured speaker at national conferences and a board member of Federal Information Systems Security Educators' Association.

Ed Tittel is a 28-year computer industry veteran with over 130 books to his credit. He writes regularly for sites such as InformIT.com and TechTarget.

Neil Broom, CCE, CISSP, CFE, is President and Laboratory Director of Technical Resource Center, Inc. in Atlanta, Georgia. He has more than 15 years of experience providing investigative, technical, educational, and security services.

Diane Barrett is a forensic trainer for Paraben. Holding many industry certifications including CISSP, ISSMP, and DCFP, she has been involved in the IT industry for almost 20 years and has been active in education, security, and forensics for the past 10 years.

Table of Contents


Chapter 1 The Need for Computer Forensics.

Chapter 2 Preparation—What to Do Before You Start.

Chapter 3 Computer Evidence.

Chapter 4 Common Tasks.

Chapter 5 Capturing the Data Image.

Chapter 6 Extracting Information from Data.

Chapter 7 Passwords and Encryption.

Chapter 8 Common Forensic Tools.

Chapter 9 Pulling It All Together.

Chapter 10 How to Testify in Court.

Appendix A Answers to Review Questions.

Appendix B Forensic Resources.

Appendix C Forensic Certifications and More.

Appendix D Forensic Tools 289



Rewards Program

Write a Review