Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides free demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.
Students save money when purchasing bundled products.
Students save money when purchasing bundled products.
Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines all-encompassing topic coverage and authoritative information from seasoned experts to deliver the most comprehensive ...
From discovery identification to collection, processing, review, production, and trial presentation, this practical text covers everything the reader needs to know about e-discovery, including the Federal Rules of Civil Procedure, Federal ...
From discovery identification to collection, processing, review, production, and trial presentation, this practical text covers everything your students need to know about e-discovery, including the Federal Rules of Civil Procedure, Federal ...
Steve Bunting he conducts digital examinations on a wide variety of devices and operating systems. He is a senior forensic examiner for Forward Discovery, Inc. In that capacity, responds to client sites and carries out incident response ...
The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way.
Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents.
Information Security professionals, managers of IT employees, business managers, organizational security officers, network administrators, students or Business and Information Systems, IT, Accounting, Criminal Justice or IS majors.
By the time you finish reading this book, you’ll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes ...