Computer Forensics jumpstart [[electronic resource] /] / Michael G. Solomon ... [et al.]
| Computer Forensics jumpstart [[electronic resource] /] / Michael G. Solomon ... [et al.] |
| Autore | Solomon Michael (Michael G.), <1963-> |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Indianopolis, IN, : Wiley, c2011 |
| Descrizione fisica | 1 online resource (338 p.) |
| Disciplina |
005.8
363.25968 |
| Altri autori (Persone) | SolomonMichael R |
| Collana | Sybex Serious Skills |
| Soggetto topico |
Computer security
Computer networks - Security measures Computer crimes - Investments Forensic sciences |
| ISBN |
1-283-37452-8
9786613374523 1-118-06757-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Computer Forensics JumpStart, Second Edition; Acknowledgments; About the Authors; Contents; Introduction; Who Should Read This Book; What This Book Covers; Making the Most of This Book; How to Contact the Authors; Chapter 1: The Need for Computer Forensics; Defining Computer Forensics; Computer Crime in Real Life; Corporate versus Law Enforcement Concerns; Training; What Are Your Organizations's Needs?; Terms to Know; Review Questions; Chapter 2: Preparation-What to Do Before You Start; Know Your Hardware; Know Your Operating System; Know Your Limits; Develop Your Incident Response Team
Terms to KnowReview Questions; Chapter 3: Computer Evidence; What Is Computer Evidense?; Search and Seizure; Chain of Custody; Admissibility of Evidence in a Court of Law; Leave No Trace; Terms to Know; Review Questions; Chapter 4: Common Tasks; Evidence Identification; Evidence Preservation; Evidence Analysis; Evidence Presentation; Terms to Know; Review Questions; Chapter 5: Capturing the Data Image; The Imaging Process; Partial Volume Images; Working with Virtual Machines; Imaging/Capture Tools; Terms to Know; Review Questions; Chapter 6: Extracting Information from Data What Are You Looking For?How People Think; Picking the Low-Hanging Fruit; Hidden Evidence; Trace Evidence; Terms to Know; Review Questions; Chapter 7: Passwords and Encryption; Passwords; Encryption Basics; Common Encryption Packages; Strengths and Weaknesses of Encryption; Handling Encrypted Data; Terms to Know; Review Questions; Chapter 8: Common Forensic Tools; Disk Imaging and Validation Tools; Forensic Tools; Your Forensic Toolkit; Terms to Know; Review Questions; Chapter 9: Pulling It All Together; Creating East-to-Use Reports; Document Everything, Assume Nothing; Formulating the Report Sample Analysis ReportsUsing Software to Generate Reports; Terms to Know; Review Questions; Chapter 10: How to Testify in Court; Preparation Is Everything; Appearance Matters; What Matters Is What They Hear; Know Your Forensic Process and Tools; Say Only What You Must; Keep It Simple; Be Ready to Justify Every Step; Summary; Terms to Know; Review Questions; Appendix A: Answers to Review Questions; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Appendix B: Forensic Resources; Information; Organizations; Publications; Services SoftwareHardware; Traininig; Appendix C: Forensic Certifications and More; AccessData Certified Examiner (ACE); Advanced Information Security (AIS); Certified Computer Examiner (CCE); Certified Hacking Forensic Investigator (CHFI); Certified Forensic Computer Examiner (CFCE); Certified Information Systems Auditor (CISA); Certified ProDiscover Examiner (CPE); EnCase Certified Examiner Program; GIAC Certified Forensic Analyst (GCFA); GIAC Certified Forensics Examiner (GCFE); Professional Certified Investigator (PCI); ASCLD/LAB Accreditation; Licensure; Appendix D: Forensic Tools Foresnsic Tools Suites |
| Record Nr. | UNINA-9910789339703321 |
Solomon Michael (Michael G.), <1963->
|
||
| Indianopolis, IN, : Wiley, c2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Forensics jumpstart [[electronic resource] /] / Michael G. Solomon ... [et al.]
| Computer Forensics jumpstart [[electronic resource] /] / Michael G. Solomon ... [et al.] |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Indianopolis, IN, : Wiley, c2011 |
| Descrizione fisica | 1 online resource (338 p.) |
| Disciplina |
005.8
363.25968 |
| Altri autori (Persone) | SolomonMichael R |
| Collana | Sybex Serious Skills |
| Soggetto topico |
Computer security
Computer networks - Security measures Computer crimes - Investments Forensic sciences |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-283-37452-8
9786613374523 1-118-06757-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Computer Forensics JumpStart, Second Edition; Acknowledgments; About the Authors; Contents; Introduction; Who Should Read This Book; What This Book Covers; Making the Most of This Book; How to Contact the Authors; Chapter 1: The Need for Computer Forensics; Defining Computer Forensics; Computer Crime in Real Life; Corporate versus Law Enforcement Concerns; Training; What Are Your Organizations's Needs?; Terms to Know; Review Questions; Chapter 2: Preparation-What to Do Before You Start; Know Your Hardware; Know Your Operating System; Know Your Limits; Develop Your Incident Response Team
Terms to KnowReview Questions; Chapter 3: Computer Evidence; What Is Computer Evidense?; Search and Seizure; Chain of Custody; Admissibility of Evidence in a Court of Law; Leave No Trace; Terms to Know; Review Questions; Chapter 4: Common Tasks; Evidence Identification; Evidence Preservation; Evidence Analysis; Evidence Presentation; Terms to Know; Review Questions; Chapter 5: Capturing the Data Image; The Imaging Process; Partial Volume Images; Working with Virtual Machines; Imaging/Capture Tools; Terms to Know; Review Questions; Chapter 6: Extracting Information from Data What Are You Looking For?How People Think; Picking the Low-Hanging Fruit; Hidden Evidence; Trace Evidence; Terms to Know; Review Questions; Chapter 7: Passwords and Encryption; Passwords; Encryption Basics; Common Encryption Packages; Strengths and Weaknesses of Encryption; Handling Encrypted Data; Terms to Know; Review Questions; Chapter 8: Common Forensic Tools; Disk Imaging and Validation Tools; Forensic Tools; Your Forensic Toolkit; Terms to Know; Review Questions; Chapter 9: Pulling It All Together; Creating East-to-Use Reports; Document Everything, Assume Nothing; Formulating the Report Sample Analysis ReportsUsing Software to Generate Reports; Terms to Know; Review Questions; Chapter 10: How to Testify in Court; Preparation Is Everything; Appearance Matters; What Matters Is What They Hear; Know Your Forensic Process and Tools; Say Only What You Must; Keep It Simple; Be Ready to Justify Every Step; Summary; Terms to Know; Review Questions; Appendix A: Answers to Review Questions; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Appendix B: Forensic Resources; Information; Organizations; Publications; Services SoftwareHardware; Traininig; Appendix C: Forensic Certifications and More; AccessData Certified Examiner (ACE); Advanced Information Security (AIS); Certified Computer Examiner (CCE); Certified Hacking Forensic Investigator (CHFI); Certified Forensic Computer Examiner (CFCE); Certified Information Systems Auditor (CISA); Certified ProDiscover Examiner (CPE); EnCase Certified Examiner Program; GIAC Certified Forensic Analyst (GCFA); GIAC Certified Forensics Examiner (GCFE); Professional Certified Investigator (PCI); ASCLD/LAB Accreditation; Licensure; Appendix D: Forensic Tools Foresnsic Tools Suites |
| Record Nr. | UNINA-9910464572503321 |
| Indianopolis, IN, : Wiley, c2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Forensics jumpstart / / Michael G. Solomon ... [et al.]
| Computer Forensics jumpstart / / Michael G. Solomon ... [et al.] |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Indianopolis, IN, : Wiley, c2011 |
| Descrizione fisica | 1 online resource (338 p.) |
| Disciplina |
005.8
363.25968 |
| Altri autori (Persone) | SolomonMichael R |
| Collana | Sybex Serious Skills |
| Soggetto topico |
Computer security
Computer networks - Security measures Computer crimes - Investments Forensic sciences |
| ISBN |
9786613374523
9781283374521 1283374528 9781118067574 1118067576 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Computer Forensics JumpStart, Second Edition; Acknowledgments; About the Authors; Contents; Introduction; Who Should Read This Book; What This Book Covers; Making the Most of This Book; How to Contact the Authors; Chapter 1: The Need for Computer Forensics; Defining Computer Forensics; Computer Crime in Real Life; Corporate versus Law Enforcement Concerns; Training; What Are Your Organizations's Needs?; Terms to Know; Review Questions; Chapter 2: Preparation-What to Do Before You Start; Know Your Hardware; Know Your Operating System; Know Your Limits; Develop Your Incident Response Team
Terms to KnowReview Questions; Chapter 3: Computer Evidence; What Is Computer Evidense?; Search and Seizure; Chain of Custody; Admissibility of Evidence in a Court of Law; Leave No Trace; Terms to Know; Review Questions; Chapter 4: Common Tasks; Evidence Identification; Evidence Preservation; Evidence Analysis; Evidence Presentation; Terms to Know; Review Questions; Chapter 5: Capturing the Data Image; The Imaging Process; Partial Volume Images; Working with Virtual Machines; Imaging/Capture Tools; Terms to Know; Review Questions; Chapter 6: Extracting Information from Data What Are You Looking For?How People Think; Picking the Low-Hanging Fruit; Hidden Evidence; Trace Evidence; Terms to Know; Review Questions; Chapter 7: Passwords and Encryption; Passwords; Encryption Basics; Common Encryption Packages; Strengths and Weaknesses of Encryption; Handling Encrypted Data; Terms to Know; Review Questions; Chapter 8: Common Forensic Tools; Disk Imaging and Validation Tools; Forensic Tools; Your Forensic Toolkit; Terms to Know; Review Questions; Chapter 9: Pulling It All Together; Creating East-to-Use Reports; Document Everything, Assume Nothing; Formulating the Report Sample Analysis ReportsUsing Software to Generate Reports; Terms to Know; Review Questions; Chapter 10: How to Testify in Court; Preparation Is Everything; Appearance Matters; What Matters Is What They Hear; Know Your Forensic Process and Tools; Say Only What You Must; Keep It Simple; Be Ready to Justify Every Step; Summary; Terms to Know; Review Questions; Appendix A: Answers to Review Questions; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Appendix B: Forensic Resources; Information; Organizations; Publications; Services SoftwareHardware; Traininig; Appendix C: Forensic Certifications and More; AccessData Certified Examiner (ACE); Advanced Information Security (AIS); Certified Computer Examiner (CCE); Certified Hacking Forensic Investigator (CHFI); Certified Forensic Computer Examiner (CFCE); Certified Information Systems Auditor (CISA); Certified ProDiscover Examiner (CPE); EnCase Certified Examiner Program; GIAC Certified Forensic Analyst (GCFA); GIAC Certified Forensics Examiner (GCFE); Professional Certified Investigator (PCI); ASCLD/LAB Accreditation; Licensure; Appendix D: Forensic Tools Foresnsic Tools Suites |
| Altri titoli varianti | JumpStart |
| Record Nr. | UNINA-9910964667403321 |
| Indianopolis, IN, : Wiley, c2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||