did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Hacking Exposed Computer Forensics, Third Edition Secrets & Solutions

9780071817745

Hacking Exposed Computer Forensics, Third Edition Secrets & Solutions

  • ISBN 13:

    9780071817745

  • ISBN 10:

    0071817743

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 06/22/2016
  • Publisher: McGraw-Hill Education
Sorry, this item is currently unavailable.

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

The most comprehensive and current computer forensics handbook explains today’s leading tools and investigation techniques.

Hacking Exposed Computer Forensics, Third Edition reveals how to identify and investigate computer crimes of all types, and explains how to construct a high-tech forensics lab, collect prosecutable evidence, discover email and system file clues, track wireless activity, and recover obscured documents. You’ll learn how to recreate the path of the attacker, access a variety of devices, gather evidence, communicate with attorneys about their investigations, and prepare reports.

In addition to a top-down update of the content, the book features several all-new chapters on the topics of cloud forensics, malware analysis, and laws and regulations in the European Union. The Hacking Exposed brand is synonymous with practical get-the-job-done tips for security practitioners. Threats to information security are more virulent today than ever before—this new edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest digital forensics cases ever seen.

  • Features three completely new chapters on cloud forensics, malware analysis, and laws and regulations in the European Union with information on data restrictions concerning international investigations
  • Explains how to restore deleted documents, partitions, user activities, and file systems
  • Details techniques for unlocking clues stored in mobile devices
  • Covers how to analyze evidence gathered from Windows, Linux, and Mac systems

Table of Contents

Read more