Hacking Exposed Computer Forensics, Third Edition Secrets & Solutions

by
Edition: 3rd
Format: Paperback
Pub. Date: 2016-06-22
Publisher(s): McGraw-Hill Education
Availability: This title is currently not available.
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $63.00

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

The most comprehensive and current computer forensics handbook explains today’s leading tools and investigation techniques.

Hacking Exposed Computer Forensics, Third Edition reveals how to identify and investigate computer crimes of all types, and explains how to construct a high-tech forensics lab, collect prosecutable evidence, discover email and system file clues, track wireless activity, and recover obscured documents. You’ll learn how to recreate the path of the attacker, access a variety of devices, gather evidence, communicate with attorneys about their investigations, and prepare reports.

In addition to a top-down update of the content, the book features several all-new chapters on the topics of cloud forensics, malware analysis, and laws and regulations in the European Union. The Hacking Exposed brand is synonymous with practical get-the-job-done tips for security practitioners. Threats to information security are more virulent today than ever before—this new edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest digital forensics cases ever seen.

  • Features three completely new chapters on cloud forensics, malware analysis, and laws and regulations in the European Union with information on data restrictions concerning international investigations
  • Explains how to restore deleted documents, partitions, user activities, and file systems
  • Details techniques for unlocking clues stored in mobile devices
  • Covers how to analyze evidence gathered from Windows, Linux, and Mac systems

Table of Contents

Brief TOCPART 1: Fundamentals1. The Forensics Process2. Computer Fundamentals3. Forensic Lab Environment PreparationPART 2: Collecting the Evidence4. Forensically Sound Evidence Collection5. Enterprise Forensic CollectionsPART 3: Forensic Analysis6. Malware7. Microsoft Windows Systems Analysis8. Linux Analysis9. Macintosh Analysis10. Cloud Analysis11. Memory Analysis12. Defeating Anti-forensic Techniques13. Enterprise Server and Storage Analysis14. Email Analysis15. Internet History Analysis16. Mobile Forensics PART 4: Presenting Your Findings17. Documenting the Investigation18. Investigations in the US Legal System 19. Investigations in the Euro Legal System 20. Investigations between Legal SystemsPART 5: Advanced Forensics21. External Device Analysis 22. Tracking the Cloud23. Enterprise Networks24. Server Side Application Forensics25. Source Code AnalysisApp A: Searching Techniques

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.