Text
The best damn cybercrime and digital forensics book period
Table of Contents
Ch. 1. Computer forensics in today's world
Ch. 2. Digital forensics: an overview
Ch. 3. Developing an enterprise digital investigative/​electronic discovery capability
Ch. 4. Integrating a quality assurance program in a digital forensic laboratory
Ch. 5. Balancing e-discovery challenges with legal and IT requirements
Ch. 6. Forensic software and hardware
Ch. 7. Incident response: live forensics and investigations
Ch. 8. Seizure of digital information
Ch. 9. Conducting cyber investigations
Ch. 10. Acquiring data, duplicating data, and recovering deleted files
Ch. 11. Forensic disovery and analysis using BackTrack
Ch. 12. Windows, Linux, and Macintosh boot processes
Ch. 13. Windows and Linux forensics
Ch. 14. Investigating network traffic and investigating logs
Ch. 15. Router forensics and network forensics
Ch. 16. Investigating wireless attacks
Ch. 17. E-mail forensics
Ch. 18. Steganography and application password crackers
Ch. 19. PDA and Blackberry
Ch. 20. MP3 forensics
No other version available