Computer forensics for dummies / Linda Volonino and Reynaldo Anzaldua.
Material type: TextSeries: --For dummiesPublication details: Hoboken, NJ : Wiley, 2008. Description: xx, 360 p. : ill. ; 24 cmISBN: 9780470371916 (pbk.); 0470371919 (pbk.)Subject(s): Computer security | Computer crimesDDC classification: 005.8 LOC classification: QA76.9.A25 | .V88 2008Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
AAMUSTED Books | AAMUSTED LIBRARY, KUMASI Lending Book Shelf | QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) | 1 | Available | 0000007335 | |
AAMUSTED Books | AAMUSTED LIBRARY, KUMASI Lending Book Shelf | QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) | 2 | Available | 0000007334 | |
AAMUSTED Books | AAMUSTED LIBRARY, KUMASI Lending Book Shelf | QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) | 3 | Available | 0000007337 | |
AAMUSTED Books | AAMUSTED LIBRARY, KUMASI Reference | QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) | 4 | Available (Restricted Access) | 0000007582 | |
AAMUSTED Books | AAMUSTED LIBRARY, KUMASI Lending Book Shelf | QA76.9.A25 .V88 2008 (Browse shelf(Opens below)) | 5 | Available | 0000007336 |
Browsing AAMUSTED LIBRARY, KUMASI shelves, Shelving location: Reference Close shelf browser (Hides shelf browser)
QA76.9.A25 P47 2018 Security in computing / | QA76.9.A25 R34 2013 Information security : Learn proven security strategies, techniques and best practices / | QA76.9.A25 .S6 2016 Elementary information security / | QA76.9.A25 .V88 2008 Computer forensics for dummies / | QA76.9.A73 B33 1980 Computer systems architecture / | QA76.9.A73 W65 1996 Computer architecture : design and performance / | QA76.9.B32 H25 2007 Oracle Database 10g RMAN backup & recovery / |
Introduction -- Pt. I: Digging out and documenting electronic evidence -- Knowing what your digital devices create, capture, and pack away -- until revelation day -- Suiting up for a lawsuit or criminal investigation -- Getting authorized to search and seize -- Documenting and managing the crime scene -- Pt. II: Preparing to crack the case -- Minding and finding the loopholes -- Acquiring and authenticating e-evidence -- Examining e-evidence -- Extracting hidden data -- Pt. III: Doing computer forensics investigations -- E-mail and web forensics -- Data forensics -- Document forensics -- Mobile forensics -- Network forensics -- Investigating x-files: exotic forensics -- Pt. IV: Succeeding in court -- Holding up your end at pretrial -- Winning a case before you go to court -- Standing your ground in court -- Pt. V: The Part of tens -- Ten ways to get qualified and prepped for success -- Ten tactics of an excellent investigator and a dangerous expert witness -- Ten cool tools for computer forensics -- Glossary -- Index.
A guide to the basics of computer forensics covers such topics as acquiring and examining e-evidence, extracting hidden data, filtering data, handling passwords and encrypted data, and exhibiting evidence in court-- source other than Library of Congress .
There are no comments on this title.