Computer Forensics and Investigations / Edition 1

Computer Forensics and Investigations / Edition 1

by Bill Nelson, Chris Stewart, Amelia Phillips, Frank Enfinger
     
 

ISBN-10: 1592003826

ISBN-13: 9781592003822

Pub. Date: 05/01/2004

Publisher: Cengage Learning

"Computer Forensics and Investigations" offers a solid introduction to a field that is vitally important. With the continued growth of the Internet and the increase in the use of computers worldwide, computers are being used to commit crimes with more frequency. Computers also make it possible to record crimes, including records of embezzlement, e-mail harassment,…  See more details below

Overview

"Computer Forensics and Investigations" offers a solid introduction to a field that is vitally important. With the continued growth of the Internet and the increase in the use of computers worldwide, computers are being used to commit crimes with more frequency. Computers also make it possible to record crimes, including records of embezzlement, e-mail harassment, leaks of proprietary information, and even terrorism. Law enforcement, network administrators, attorneys, and private investigators now rely on the skills of professional computer forensics experts to investigate criminal and civil cases. "Computer Forensics and Investigations" is intended for novices who have a firm understanding of the basics of computers and networking. It can be used to help you pass the appropriate certification exams and covers multiple operating systems as well as a range of computer hardware. "Computer Forensics and Investigations" is your guide to becoming a skilled computer forensics investigator.

Read More

Product Details

ISBN-13:
9781592003822
Publisher:
Cengage Learning
Publication date:
05/01/2004
Pages:
576
Product dimensions:
7.36(w) x 9.16(h) x 1.38(d)

Table of Contents

Chapter 1: Computer Forensics and Investigations as a Profession Chapter 2: Understanding Computer Investigations Chapter 3: Working with Windows and DOS Systems Chapter 4: Macintosh and Linux Boot Processes and Disk Structures Chapter 5: The Investigator 's Office and Laboratory Chapter 6: Current Computer Forensics Tools Chapter 7: Digital Evidence Controls Chapter 8: Processing Crime and Incident Scenes Chapter 9: Data Acquisition Chapter 10: Computer Forensic Analysis Chapter 11: E-mail Investigations Chapter 12: Recovering Image Files Chapter 13: Writing Investigation Reports Chapter 14: Becoming an Expert Witness Appendix A: Certification Test References Appendix B: Computer Forensics References Appendix C: Procedures for Corporate High-Technology Investigations

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >