System Forensics, Investigation, and Response

  • 6 Want to read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 6 Want to read

Buy this book

Last edited by ImportBot
December 20, 2023 | History

System Forensics, Investigation, and Response

  • 6 Want to read

Completely revised and rewritten to keep pace with the fast-paced field of Computer Forensics! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response, Second Edition begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field. New and key features of the Second Edition: Examines the fundamentals of system forensics; Discusses computer crimes and forensic methods; Written in an accessible and engaging style; Incorporates real-world examples and engaging cases. - Publisher.

Publish Date
Language
English
Pages
318

Buy this book

Edition Availability
Cover of: System Forensics, Investigation, and Response
System Forensics, Investigation, and Response
2017, Jones & Bartlett Learning, LLC
in English
Cover of: System Forensics, Investigation, and Response
System Forensics, Investigation, and Response
2014, Jones & Bartlett Learning
Paperback in English

Add another edition?

Book Details


Table of Contents

Part one : The system forensics landscape.
Introduction to forensics
Overview of computer crime
Forensic methods and labs
Part two : Technical overview : system forensics tools, techniques, and methods.
Collecting, seizing, and protecting evidence
Understanding techniques for hiding and scrambling information
Recovering data
E-mail forensics
Windows forensics
Linux forensics
Macintosh forensics
Mobile forensics
Performing network analysis
Part three : Incident response and resources.
Incident and intrusion response
Trends and future directions
System forensics resources
Appendixes. Answer key
Standard acronyms
Glossary of key terms

Edition Notes

Published in
Burlington, MA

Classifications

Library of Congress
HV8079.C65E37 2014, HV8079.C65 E37 2014

The Physical Object

Format
Paperback
Pagination
xvi, 315 p.
Number of pages
318
Dimensions
24 x x centimeters

ID Numbers

Open Library
OL25436477M
ISBN 10
1284031055
ISBN 13
9781284031058
LCCN
2014427149
OCLC/WorldCat
864683524

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
December 20, 2023 Edited by ImportBot import existing book
November 14, 2020 Edited by MARC Bot import existing book
October 11, 2020 Edited by ImportBot import existing book
August 3, 2020 Edited by ImportBot import existing book
January 21, 2014 Created by Bryan Tyson Added new book.