Get Free Shipping on orders over $89
Hacking Exposed Computer Forensics, Second Edition : Computer Forensics Secrets & Solutions - Aaron Philipp

Hacking Exposed Computer Forensics, Second Edition

Computer Forensics Secrets & Solutions

By: Aaron Philipp, David Cowen, Chris Davis

Paperback | 1 October 2009 | Edition Number 2

At a Glance

Paperback


RRP $78.10

$77.75

or 4 interest-free payments of $19.44 with

 or 

Ships in 5 to 7 business days

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation

The latest strategies for investigating cyber-crime

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.Effectively uncover, capture, and prepare evidence for investigationStore and process collected data in a highly secure digital forensic labRestore deleted documents, partitions, user activities, and file systemsAnalyze evidence gathered from Windows, Linux, and Macintosh systemsUse the latest Web and client-based e-mail tools to extract relevant artifactsOvercome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devicesPrepare legal documents that will hold up to judicial and defense scrutiny

More in Network Programming

Seven Concurrency Models in Seven Weeks : When Threads Unravel - Paul Butcher
AIX 5L Administration : McGraw-Hill Osborne Networking - Randal K. Michael
Web Services Security : Application Development - Mark O'Neill

RRP $103.95

$92.75

11%
OFF
RFID Implementation - Dennis Brown

$202.75

Iptv Crash Course : Crash Course - Joseph M. Weber
Delivering Carrier Ethernet : Extending Ethernet Beyond the LAN - Abdul Kasim
Microsoft Windows Server 2008 : A Beginner's Guide - Marty Matthews
Microsoft Windows Server 2008 : The Complete Reference - Danielle Ruest
Fixed Mobile Convergence : McGraw-Hill Communications Series - Alex Shneyderman
Microsoft Exchange Server 2007 : The Complete Reference - Richard Luckett
Hacking Exposed Linux : Linux Security Secrets and Solutions - ISECOM
Internet of Things : Principles and Paradigms - Amir Dastjerdi

RRP $153.95

$127.75

17%
OFF