Browse Subject Headings
Computer Forensics : Principles and Practices
Computer Forensics : Principles and Practices
Click to enlarge
Author(s): Godwin, Jana
Volonino, Linda
ISBN No.: 9780131547278
Pages: 552
Year: 200608
Format: Perfect (Trade Paper)
Price: $ 158.12
Status: Out Of Print

Master the techniques for gathering electronic evidence and explore the new frontier of crime investigation. #xA0; #xA0; The demand for computer forensics experts greatly exceeds the supply. With the rapid growth of technology in all parts of our lives, criminal activity must be tracked down and investigated using electronic methods that require up-to-date techniques and knowledge of the latest software tools. Authors Linda Volonino, Jana Godwin, and Reynaldo Anzaldua share their expertise to give you the legal, technical, and investigative skills you need to launch your career in computer forensics. You can also use Computer Forensics: Principles and Practices#xA0; to help you advance in careers such as criminal justice, accounting, law enforcement, and federal investigation. #xA0; Computer Forensics : Principles and Practices gives you in-depth understanding of: Using the correct investigative tools and procedures to maximize effectiveness of evidence gathering. Keeping evidence in pristine condition so it will be admissible in a legal action. #xB7;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0; Investigating large-scale attacks such as identity theft, fraud, phishing, extortion, and malware infections.


The legal foundations for proper handling of traditional and electronic evidence such as the Federal Rules of Evidence and Procedure as well as the Fourth Amendment and other laws regarding search warrants and civil rights. Practical tools such as FTK, EnCase, Passware, Ethereal, LADS, WinHex, GIMP, Camouflage, and Snort. #xA0; This book is filled with tools to help you move beyond simply learning concepts and help you applythem. These tools include: #xB7;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0; In Practice tutorials:Apply concepts and learn by doing. #xB7;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0; Exercises and Projects:Assignments show you how to employ your new skills.#xA0; Case Studies:Apply what you learn in real-world scenarios. #xA0; The companion Web site (www.prenhall.


com/security) includes: #xB7;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0; Additional testing materials and projects to reinforce book lessons. #xB7;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0; Downloadable checklists and templates used in the book. #xB7;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0;#xA0; Links to additional topics and resources to assist you in your professional development. #xA0; #xA0; #xA0; #xA0;.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings