Text
System forensics, investigation, and response
Table of contents:
1. The system forensics landscape
2. System forensics fundamentals
3. Overview of computer crime
4. Challenges of system forensics
5. Forensics methods and labs
6. Technical overview: system forensics tools, techniques, and methods
7. System forensics technologies
8. Controlling a forensic investigation
9. Collecting, seizing, and protecting evidence
10. Understanding information-hiding techniques
11. Recovering data
12. Investigating and scrutinizing E-mail
13. Performing network analysis
14. Searching memory in real time with live system forensics
15. Incident response, future directions, and resources
16. Incident and intrusion response
17. Trends and future directions
18. System forensics resources
No other version available