Text
Hacking exposed computer forensics: secrets & solutions
Terdapat indeks.
Table of contents:
Part 1 Preparing for an incident
1 The forensics process
2 Computer fundamentals
3 Forensic lab environment preparation
Part 2 Collecting the evidence
4 Forensically sound evidence collection
5 Remote investigations and collections
Part 3 Forensic investigation techniques
6 Microsoft Windows Systems analysis
7 Linux analysis
8 Macintosh analysis
9 Defeating anti-forensic techniques
10 Enterprise storage analysis
11 E-mail analysis
12 Tracking user activity
13 Forensic analysis of mobile devices
Part 4 Presenting your findings
14 Documenting the investigation
15 The justice system
Part 5 Putting it all together
16 IP theft
17 Employee misconduct
18 Employee fraud
19 Corporate fraud
20 Organized cyber crime
21 Consumer fraud
Searching techniques.
No other version available