How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For techn
Computer Forensics A Pocket Guide
- Publisher
- IT Governance Publishing
- Year
- 2010
- Tongue
- English
- Leaves
- 75
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required.
β¦ Table of Contents
CHAPTER 1: THE ROLE OF FORENSICS WITHIN ORGANISATIONS......Page 10
CHAPTER 2: BE PREPARED β PROACTIVE FORENSICS......Page 17
CHAPTER 3: FORENSIC ACQUISITION OF DATA......Page 26
CHAPTER 4: FORENSIC ANALYSIS OF DATA......Page 34
CHAPTER 5: ANTI-FORENSICS AND ENCRYPTION......Page 46
CHAPTER 6: EMBEDDED AND NETWORK FORENSICS......Page 52
CONCLUSION......Page 58
Specialist books in Computer Forensics......Page 60
Software and tools......Page 64
Web resources......Page 69
ITG RESOURCES......Page 73
π SIMILAR VOLUMES
How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For techn
<P>In this book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. "Forensic Computing: A Practitioner's Guide" is illustrated by plenty of case studies and worked examples, and wil