rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780071817745

Hacking Exposed Computer Forensics, Third Edition Secrets & Solutions

by
  • ISBN13:

    9780071817745

  • ISBN10:

    0071817743

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2016-06-22
  • Publisher: McGraw-Hill Education
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00
We're Sorry.
No Options Available at This Time.

Summary

The most comprehensive and current computer forensics handbook explains today’s leading tools and investigation techniques.

Hacking Exposed Computer Forensics, Third Edition reveals how to identify and investigate computer crimes of all types, and explains how to construct a high-tech forensics lab, collect prosecutable evidence, discover email and system file clues, track wireless activity, and recover obscured documents. You’ll learn how to recreate the path of the attacker, access a variety of devices, gather evidence, communicate with attorneys about their investigations, and prepare reports.

In addition to a top-down update of the content, the book features several all-new chapters on the topics of cloud forensics, malware analysis, and laws and regulations in the European Union. The Hacking Exposed brand is synonymous with practical get-the-job-done tips for security practitioners. Threats to information security are more virulent today than ever before—this new edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest digital forensics cases ever seen.

  • Features three completely new chapters on cloud forensics, malware analysis, and laws and regulations in the European Union with information on data restrictions concerning international investigations
  • Explains how to restore deleted documents, partitions, user activities, and file systems
  • Details techniques for unlocking clues stored in mobile devices
  • Covers how to analyze evidence gathered from Windows, Linux, and Mac systems

Table of Contents

Brief TOCPART 1: Fundamentals1. The Forensics Process2. Computer Fundamentals3. Forensic Lab Environment PreparationPART 2: Collecting the Evidence4. Forensically Sound Evidence Collection5. Enterprise Forensic CollectionsPART 3: Forensic Analysis6. Malware7. Microsoft Windows Systems Analysis8. Linux Analysis9. Macintosh Analysis10. Cloud Analysis11. Memory Analysis12. Defeating Anti-forensic Techniques13. Enterprise Server and Storage Analysis14. Email Analysis15. Internet History Analysis16. Mobile Forensics PART 4: Presenting Your Findings17. Documenting the Investigation18. Investigations in the US Legal System 19. Investigations in the Euro Legal System 20. Investigations between Legal SystemsPART 5: Advanced Forensics21. External Device Analysis 22. Tracking the Cloud23. Enterprise Networks24. Server Side Application Forensics25. Source Code AnalysisApp A: Searching Techniques

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program