Image from Google Jackets

Computer forensics for dummies / Linda Volonino and Reynaldo Anzaldua.

By: Volonino, LindaContributor(s): Anzaldua, ReynaldoMaterial type: TextTextSeries: --For dummiesPublication details: Hoboken, NJ : Wiley, 2008. Description: xx, 360 p. : ill. ; 24 cmISBN: 9780470371916 (pbk.); 0470371919 (pbk.)Subject(s): Computer security | Computer crimesDDC classification: 005.8 LOC classification: QA76.9.A25 | .V88 2008
Partial contents:
Introduction -- Pt. I: Digging out and documenting electronic evidence -- Knowing what your digital devices create, capture, and pack away -- until revelation day -- Suiting up for a lawsuit or criminal investigation -- Getting authorized to search and seize -- Documenting and managing the crime scene -- Pt. II: Preparing to crack the case -- Minding and finding the loopholes -- Acquiring and authenticating e-evidence -- Examining e-evidence -- Extracting hidden data -- Pt. III: Doing computer forensics investigations -- E-mail and web forensics -- Data forensics -- Document forensics -- Mobile forensics -- Network forensics -- Investigating x-files: exotic forensics -- Pt. IV: Succeeding in court -- Holding up your end at pretrial -- Winning a case before you go to court -- Standing your ground in court -- Pt. V: The Part of tens -- Ten ways to get qualified and prepped for success -- Ten tactics of an excellent investigator and a dangerous expert witness -- Ten cool tools for computer forensics -- Glossary -- Index.
Summary: A guide to the basics of computer forensics covers such topics as acquiring and examining e-evidence, extracting hidden data, filtering data, handling passwords and encrypted data, and exhibiting evidence in court-- source other than Library of Congress .
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
AAMUSTED Books AAMUSTED Books AAMUSTED LIBRARY, KUMASI
Lending Book Shelf
QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) 1 Available 0000007335
AAMUSTED Books AAMUSTED Books AAMUSTED LIBRARY, KUMASI
Lending Book Shelf
QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) 2 Available 0000007334
AAMUSTED Books AAMUSTED Books AAMUSTED LIBRARY, KUMASI
Lending Book Shelf
QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) 3 Available 0000007337
AAMUSTED Books AAMUSTED Books AAMUSTED LIBRARY, KUMASI
Reference
QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) 4 Available (Restricted Access) 0000007582
AAMUSTED Books AAMUSTED Books AAMUSTED LIBRARY, KUMASI
Lending Book Shelf
QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) 5 Available 0000007336
Browsing AAMUSTED LIBRARY, KUMASI shelves, Shelving location: Lending Book Shelf Close shelf browser (Hides shelf browser)
QA76.9.A25 Ea7 2016 Computer security fundamentals/ QA76.9.A25 .G72 Information security auditor/ Wendy Goucher. QA76.9.A25 .S6 2016 Elementary information security / QA76.9.A25 .V88 2008 Computer forensics for dummies / QA76.9.A25 .V88 2008 Computer forensics for dummies / QA76.9.A25 .V88 2008 Computer forensics for dummies / QA76.9.A25 .V88 2008 Computer forensics for dummies /

Introduction -- Pt. I: Digging out and documenting electronic evidence -- Knowing what your digital devices create, capture, and pack away -- until revelation day -- Suiting up for a lawsuit or criminal investigation -- Getting authorized to search and seize -- Documenting and managing the crime scene -- Pt. II: Preparing to crack the case -- Minding and finding the loopholes -- Acquiring and authenticating e-evidence -- Examining e-evidence -- Extracting hidden data -- Pt. III: Doing computer forensics investigations -- E-mail and web forensics -- Data forensics -- Document forensics -- Mobile forensics -- Network forensics -- Investigating x-files: exotic forensics -- Pt. IV: Succeeding in court -- Holding up your end at pretrial -- Winning a case before you go to court -- Standing your ground in court -- Pt. V: The Part of tens -- Ten ways to get qualified and prepped for success -- Ten tactics of an excellent investigator and a dangerous expert witness -- Ten cool tools for computer forensics -- Glossary -- Index.

A guide to the basics of computer forensics covers such topics as acquiring and examining e-evidence, extracting hidden data, filtering data, handling passwords and encrypted data, and exhibiting evidence in court-- source other than Library of Congress .

There are no comments on this title.

to post a comment.


© AAMUSTED, 2021. All rights reserved.