Text
Guide to computer forensics and investigations
Table of Contents
1: Computer Forensics and Investigation Processes.
2: Understanding Computing Investigations.
3: The Investigator's Office and Laboratory.
4: Data Acquisitions.
5: Processing Crime and Incident Scenes.
6: Working with Windows and DOS Systems.
7: Current Computer Forensics Tools.
8: Macintosh and Linux Boot Processes and File Systems.
9: Computer Forensics Analysis.
10: Recovering Graphics Files.
11: Virtual Machines, Network Forensics, and Live Acquisitions.
12: E-mail Investigations.
13: Cell Phone and Mobile Device Forensics.
14: Report Writing for High-Tech Investigations.
15: Expert Testimony in High-Tech Investigations.
16: Ethics and High-Tech Investigations.
Appendix A: Certification and Testing Processes for Computer Forensics.
Appendix B: ComputerForensics References.
Appendix C: Computer Forensics Lab Configuration.
Appendix D: DOS-Based Computer Forensics Tools.
No other version available