Hacking Exposed Computer Forensics (Aaron Philipp, et al)

 
0.0 (0)
Hacking Exposed Computer Forensics (Aaron Philipp, et al)

With the aid of this fully updated, practical guide, you can identify and look into computer thieves of all shades.

This book describes how to build a high-tech forensic lab, gather admissible evidence, find clues in system files and emails, monitor WiFi activities, and recover documents that have been disguised.

Learn how to follow in an attacker's footsteps, interact with legal counsel, develop court-ready reports, and overcome logistical and legal obstacles. IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud instances are all covered in case studies taken directly from today's headlines.

  • Effectively uncover, capture, and prepare evidence for investigation
  • Store and process collected data in a highly secure digital forensic lab
  • Restore deleted documents, partitions, user activities, and file systems
  • Analyze evidence gathered from Windows, Linux, and Macintosh systems
  • Use the latest Web and client-based e-mail tools to extract relevant artifacts
  • Overcome the hacker's anti-forensic, encryption, and obscurity techniques
  • Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
  • Prepare legal documents that will hold up to judicial and defense scrutiny

Similar Programming & Computer Books

RSA暗号体験入門 - Introduction to RSA Crypto Experience (CyberSyndrome)
In this free programming book, public key and RSA cryptography are primarily explained for beginners and intermediate users.  
Java 2 Network Security (Marco Pistoia, et al.)
With thorough coverage of the new Java 2 security models, this book offers the entire insiders' guide to protecting Java 2 enterprise applications. Developed to assist you in incorporating...
Greasemonkey Hacks: Tips & Tools for Remixing the Web with Firefox (Mark Pilgrim)
For hardcore users who wish to learn Greasemonkey, the hottest new Firefox plugin that enables you to write scripts that modify the web pages you see, this book is...
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (Gabriella Coleman)
The definitive work on Anonymous, the global movement of hackers, pranksters, and activists.  
Hacking Kubernetes: Threat-Driven Analysis and Defense (Andrew Martin, et al)
To operate your Kubernetes workloads in a secure and reliable manner, A threat-based overview of Kubernetes security is provided in this useful open-source book. ...
Learn Ethical Hacking from Scratch (Zaid Sabih)
The fundamentals of ethical hacking, how to hack safely and legally, how to install Kali Linux and use the Linux terminal are covered at the beginning of this book....
Watermarking - Volume 2 (Mithun Das Gupta)
The books in this collection contain some of the most recent advancements in the watermarking industry. To make this work a significant contribution to science, authors with various backgrounds...
Watermarking - Volume 1 (Mithun Das Gupta)
Some of the most recent advancements in the watermarking discipline are presented in this collection of books. To make this book a significant contribution to scientific study, authors from...
Image Steganography and Steganalysis (Philip Bateman)
The art of steganography is two-way secret communication that hides both the existence and the content of a message.
Textbook of Forensic Medicine and Toxicology (Nageshkumar G. Rao)
For forensic science undergraduate students, this book is thorough. Students pursuing careers in the ayurveda, homoeopathic, unani, and siddha systems of medicine might also find it helpful. ...

Others Programming Books by McGraw-Hill Education

Computer Science Tapestry: Exploring Programming and Computer Science with C++ (Owen L. Astrachan)
This book is intended for a first-year computer science course1 that employs C++ as the primary programming language.

User reviews

There are no user reviews for this listing.
Ratings
Rate this Book
Comments