System forensics, investigation, and response / Chuck Easttom.
Series: Publication details: Burlington, MA : Jones & Bartlett Learning, c2014.Edition: 2nd edDescription: xvi, 315 p. : illISBN:- 9781284031058
- 363.259 68 Q4
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Mahatma Gandhi University Library General Stacks | 363.259 68 Q4 (Browse shelf(Opens below)) | Available | 57358 |
Browsing Mahatma Gandhi University Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
363.25 Q4 Advanced criminal investigations and intelligence operations: | 363.25 Q9 Crime solvability factors: police resources and crime detection/ | 363.252 028 546 78 Q5 Cybervetting : | 363.259 68 Q4 System forensics, investigation, and response / | 363.259 809 68 Q9 Combating wildlife crime in South Africa: using gelatine lifters for forensic trace recovery/ | 363.286 099 8 R0 Coast guards and ocean politics in the Arctic/ | 363.325 092 520 954 93 Q2 Women in terrorism: |
Includes bibliographical references (p. 301-302) and index.
The system forensics landscape. Introduction to forensics ; Overview of computer crime ; Forensics methods and labs -- Technical overview: system forensics tools, techniques, and methods. Collecting, seizing, and protecting evidence ; Understanding techniques for hiding and scrambling information ; Recovering data ; E-mail forensics -- Windows forensics ; Linux forensics ; Macintosh forensics ; Mobile forensics ; Performing network analysis -- Incident response and resources. Incident and intrusion response ; Trends and future directions ; System forensics resources.
"Completely revised and rewritten to keep pace with the fast-paced field of Computer Forensics! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response, Second Edition begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field. New and key features of the Second Edition: Examines the fundamentals of system forensics; Discusses computer crimes and forensic methods; Written in an accessible and engaging style; Incorporates real-world examples and engaging cases."--Publisher.
There are no comments on this title.