Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and…mehr
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You'll discover how to use the latest forensic software, tools, and equipment to find the answers that you're looking for in record time. When you understand how data is stored, encrypted, and recovered, you'll be able to protect your personal privacy as well. By the time you finish reading this book, you'll know how to: * Prepare for and conduct computer forensics investigations * Find and filter data * Protect personal privacy * Transfer evidence without contaminating it * Anticipate legal loopholes and opponents' methods * Handle passwords and encrypted data * Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Linda Volonino (PhD, MBA, CISSP, ACFE) is a computer forensic investigator and expert witness with Robson Forensic, Inc. and a member of InfraGard. Reynaldo Anzaldua (MBA, CISSP, EnCE, CHFI, IBM I-Series) teaches computer forensics and information security at South Texas College and works with private organizations and government agencies.
Inhaltsangabe
Introduction. Part I: Digging Out and Documenting Electronic Evidence. Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away -- Until Revelation Day. Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation. Chapter 3: Getting Authorized to Search and Seize. Chapter 4: Documenting and Managing the Crime Scene. Part II: Preparing to Crack the Case. Chapter 5: Minding and Finding the Loopholes. Chapter 6: Acquiring and Authenticating E-Evidence. Chapter 7: Examining E-Evidence. Chapter 8: Extracting Hidden Data. Part III: Doing Computer Forensic Investigations. Chapter 9: E-Mail and Web Forensics. Chapter 10: Data Forensics. Chapter 11: Document Forensics. Chapter 12: Mobile Forensics. Chapter 13: Network Forensics. Chapter 14: Investigating X-Files: eXotic Forensics. Part IV: Succeeding in Court. Chapter 15: Holding Up Your End at Pretrial. Chapter 16: Winning a Case Before You Go to Court. Chapter 17: Standing Your Ground in Court. Part V: The Part of Tens. Chapter 18: Ten Ways to Get Qualifi ed and Prepped for Success. Chapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness. Chapter 20: Ten Cool Tools for Computer Forensics. Glossary. Index.
Introduction. Part I: Digging Out and Documenting Electronic Evidence. Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away -- Until Revelation Day. Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation. Chapter 3: Getting Authorized to Search and Seize. Chapter 4: Documenting and Managing the Crime Scene. Part II: Preparing to Crack the Case. Chapter 5: Minding and Finding the Loopholes. Chapter 6: Acquiring and Authenticating E-Evidence. Chapter 7: Examining E-Evidence. Chapter 8: Extracting Hidden Data. Part III: Doing Computer Forensic Investigations. Chapter 9: E-Mail and Web Forensics. Chapter 10: Data Forensics. Chapter 11: Document Forensics. Chapter 12: Mobile Forensics. Chapter 13: Network Forensics. Chapter 14: Investigating X-Files: eXotic Forensics. Part IV: Succeeding in Court. Chapter 15: Holding Up Your End at Pretrial. Chapter 16: Winning a Case Before You Go to Court. Chapter 17: Standing Your Ground in Court. Part V: The Part of Tens. Chapter 18: Ten Ways to Get Qualifi ed and Prepped for Success. Chapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness. Chapter 20: Ten Cool Tools for Computer Forensics. Glossary. Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309