Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
69,40 €*
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
Kategorien:
Beschreibung
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedings
Key Features
Learn the core techniques of computer forensics to acquire and secure digital evidence skillfully
Conduct a digital forensic examination and document the digital evidence collected
Analyze security systems and overcome complex challenges with a variety of forensic investigations
Book Description
A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation. This book will help you get up and running with using digital forensic tools and techniques to investigate cybercrimes successfully.
Starting with an overview of forensics and all the open source and commercial tools needed to get the job done, you'll learn core forensic practices for searching databases and analyzing data over networks, personal devices, and web applications. You'll then learn how to acquire valuable information from different places, such as filesystems, e-mails, browser histories, and search queries, and capture data remotely. As you advance, this book will guide you through implementing forensic techniques on multiple platforms, such as Windows, Linux, and macOS, to demonstrate how to recover valuable information as evidence. Finally, you'll get to grips with presenting your findings efficiently in judicial or administrative proceedings.
By the end of this book, you'll have developed a clear understanding of how to acquire, analyze, and present digital evidence like a proficient computer forensics investigator.
What you will learn
Understand investigative processes, the rules of evidence, and ethical guidelines
Recognize and document different types of computer hardware
Understand the boot process covering BIOS, UEFI, and the boot sequence
Validate forensic hardware and software
Discover the locations of common Windows artifacts
Document your findings using technically correct terminology
Who this book is for
If you're an IT beginner, student, or an investigator in the public or private sector this book is for [...] book will also help professionals and investigators who are new to incident response and digital forensics and interested in making a career in the cybersecurity domain.
Key Features
Learn the core techniques of computer forensics to acquire and secure digital evidence skillfully
Conduct a digital forensic examination and document the digital evidence collected
Analyze security systems and overcome complex challenges with a variety of forensic investigations
Book Description
A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation. This book will help you get up and running with using digital forensic tools and techniques to investigate cybercrimes successfully.
Starting with an overview of forensics and all the open source and commercial tools needed to get the job done, you'll learn core forensic practices for searching databases and analyzing data over networks, personal devices, and web applications. You'll then learn how to acquire valuable information from different places, such as filesystems, e-mails, browser histories, and search queries, and capture data remotely. As you advance, this book will guide you through implementing forensic techniques on multiple platforms, such as Windows, Linux, and macOS, to demonstrate how to recover valuable information as evidence. Finally, you'll get to grips with presenting your findings efficiently in judicial or administrative proceedings.
By the end of this book, you'll have developed a clear understanding of how to acquire, analyze, and present digital evidence like a proficient computer forensics investigator.
What you will learn
Understand investigative processes, the rules of evidence, and ethical guidelines
Recognize and document different types of computer hardware
Understand the boot process covering BIOS, UEFI, and the boot sequence
Validate forensic hardware and software
Discover the locations of common Windows artifacts
Document your findings using technically correct terminology
Who this book is for
If you're an IT beginner, student, or an investigator in the public or private sector this book is for [...] book will also help professionals and investigators who are new to incident response and digital forensics and interested in making a career in the cybersecurity domain.
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedings
Key Features
Learn the core techniques of computer forensics to acquire and secure digital evidence skillfully
Conduct a digital forensic examination and document the digital evidence collected
Analyze security systems and overcome complex challenges with a variety of forensic investigations
Book Description
A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation. This book will help you get up and running with using digital forensic tools and techniques to investigate cybercrimes successfully.
Starting with an overview of forensics and all the open source and commercial tools needed to get the job done, you'll learn core forensic practices for searching databases and analyzing data over networks, personal devices, and web applications. You'll then learn how to acquire valuable information from different places, such as filesystems, e-mails, browser histories, and search queries, and capture data remotely. As you advance, this book will guide you through implementing forensic techniques on multiple platforms, such as Windows, Linux, and macOS, to demonstrate how to recover valuable information as evidence. Finally, you'll get to grips with presenting your findings efficiently in judicial or administrative proceedings.
By the end of this book, you'll have developed a clear understanding of how to acquire, analyze, and present digital evidence like a proficient computer forensics investigator.
What you will learn
Understand investigative processes, the rules of evidence, and ethical guidelines
Recognize and document different types of computer hardware
Understand the boot process covering BIOS, UEFI, and the boot sequence
Validate forensic hardware and software
Discover the locations of common Windows artifacts
Document your findings using technically correct terminology
Who this book is for
If you're an IT beginner, student, or an investigator in the public or private sector this book is for [...] book will also help professionals and investigators who are new to incident response and digital forensics and interested in making a career in the cybersecurity domain.
Key Features
Learn the core techniques of computer forensics to acquire and secure digital evidence skillfully
Conduct a digital forensic examination and document the digital evidence collected
Analyze security systems and overcome complex challenges with a variety of forensic investigations
Book Description
A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation. This book will help you get up and running with using digital forensic tools and techniques to investigate cybercrimes successfully.
Starting with an overview of forensics and all the open source and commercial tools needed to get the job done, you'll learn core forensic practices for searching databases and analyzing data over networks, personal devices, and web applications. You'll then learn how to acquire valuable information from different places, such as filesystems, e-mails, browser histories, and search queries, and capture data remotely. As you advance, this book will guide you through implementing forensic techniques on multiple platforms, such as Windows, Linux, and macOS, to demonstrate how to recover valuable information as evidence. Finally, you'll get to grips with presenting your findings efficiently in judicial or administrative proceedings.
By the end of this book, you'll have developed a clear understanding of how to acquire, analyze, and present digital evidence like a proficient computer forensics investigator.
What you will learn
Understand investigative processes, the rules of evidence, and ethical guidelines
Recognize and document different types of computer hardware
Understand the boot process covering BIOS, UEFI, and the boot sequence
Validate forensic hardware and software
Discover the locations of common Windows artifacts
Document your findings using technically correct terminology
Who this book is for
If you're an IT beginner, student, or an investigator in the public or private sector this book is for [...] book will also help professionals and investigators who are new to incident response and digital forensics and interested in making a career in the cybersecurity domain.
Über den Autor
William Oettinger is a veteran technical trainer and investigator. He is a retired police officer with the Las Vegas Metropolitan Police Department and a retired CID agent with the United States Marine Corps. He is a professional with over 20 years' experience in academic, local, military, federal, and international law enforcement organizations, where he acquired his multifaceted experience in IT, digital forensics, security operations, law enforcement, criminal investigations, policy, and procedure development. He has earned an MSc from Tiffin University, Ohio. He works for Bilecki and Tipon LLLC and the University of Maryland Global Campus (UMGC). When not working, he likes to spend time with his wife and his two miniature schnauzers.
Details
Erscheinungsjahr: | 2020 |
---|---|
Fachbereich: | EDV |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Thema: | Lexika |
Medium: | Taschenbuch |
ISBN-13: | 9781838648176 |
ISBN-10: | 1838648178 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Oettinger, William |
Hersteller: | Packt Publishing |
Maße: | 235 x 191 x 20 mm |
Von/Mit: | William Oettinger |
Erscheinungsdatum: | 24.04.2020 |
Gewicht: | 0,69 kg |
Über den Autor
William Oettinger is a veteran technical trainer and investigator. He is a retired police officer with the Las Vegas Metropolitan Police Department and a retired CID agent with the United States Marine Corps. He is a professional with over 20 years' experience in academic, local, military, federal, and international law enforcement organizations, where he acquired his multifaceted experience in IT, digital forensics, security operations, law enforcement, criminal investigations, policy, and procedure development. He has earned an MSc from Tiffin University, Ohio. He works for Bilecki and Tipon LLLC and the University of Maryland Global Campus (UMGC). When not working, he likes to spend time with his wife and his two miniature schnauzers.
Details
Erscheinungsjahr: | 2020 |
---|---|
Fachbereich: | EDV |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Thema: | Lexika |
Medium: | Taschenbuch |
ISBN-13: | 9781838648176 |
ISBN-10: | 1838648178 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Oettinger, William |
Hersteller: | Packt Publishing |
Maße: | 235 x 191 x 20 mm |
Von/Mit: | William Oettinger |
Erscheinungsdatum: | 24.04.2020 |
Gewicht: | 0,69 kg |
Warnhinweis