𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer Forensics: A Pocket Guide

✍ Scribed by Nathan Clarke


Publisher
IT Governance Publishing
Year
2010
Tongue
English
Leaves
75
Edition
1st
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required.

✦ Table of Contents


CHAPTER 1: THE ROLE OF FORENSICS WITHIN ORGANISATIONS......Page 10
CHAPTER 2: BE PREPARED – PROACTIVE FORENSICS......Page 17
CHAPTER 3: FORENSIC ACQUISITION OF DATA......Page 26
CHAPTER 4: FORENSIC ANALYSIS OF DATA......Page 34
CHAPTER 5: ANTI-FORENSICS AND ENCRYPTION......Page 46
CHAPTER 6: EMBEDDED AND NETWORK FORENSICS......Page 52
CONCLUSION......Page 58
Specialist books in Computer Forensics......Page 60
Software and tools......Page 64
Web resources......Page 69
ITG RESOURCES......Page 73


πŸ“œ SIMILAR VOLUMES


Computer Forensics A Pocket Guide
πŸ“‚ Library πŸ“… 2010 πŸ› IT Governance Publishing 🌐 English

This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required.

Computer Forensics: A Pocket Guide
✍ Nathan Clarke πŸ“‚ Library πŸ“… 2010 πŸ› IT Governance Publishing 🌐 English

How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For techn

Forensic Computing: A Practitioner’s Gui
✍ A. J. Sammes BSc, MPhil, PhD, FBCS, CEng, B. L. Jenkinson BA, BSc (hon), MBCS (a πŸ“‚ Library πŸ“… 2000 πŸ› Springer London 🌐 English

<P>In this book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. "Forensic Computing: A Practitioner's Guide" is illustrated by plenty of case studies and worked examples, and wil