1st Edition. Used books are NOT guaranteed to contain components and/or supplements such as: Access Codes or working CD's/DVD's! Ships fast! Expedited shipping 2-4 business days; ...Standard shipping 7-14 business days. Ships from USA!Read moreShow Less
Used - Good 1st Edition May contain highlighting/underlining/notes/etc. May have used stickers on cover. Ships same or next day. Expedited shipping takes 2-3 business days; ...standard shipping takes 4-14 business days.Read moreShow Less
Shipped by Better World Books. Great condition for a used book! Minimal wear. 100% Money Back Guarantee. Shipped to over one million happy customers. For California residents, the ...list price includes applicable sales tax.Read moreShow Less
Shipped by Better World Books. Shows some signs of wear, and may have some markings on the inside. 100% Money Back Guarantee. Shipped to over one million happy customers. For ...California residents, the list price includes applicable sales tax.Read moreShow Less
2006 Paperback Good Books have varying amounts of wear and highlighting. Usually ships within 24 hours in quality packaging. Satisfaction guaranteed. This item may not include ...any CDs, Infotracs, Access cards or other supplementary material.Read moreShow Less
Master the techniques for gathering electronic evidence and explore the new frontier of crime investigation.
The demand for computer forensics experts greatly exceeds the supply. With the rapid growth of technology in all parts of our lives, criminal activity must be tracked down and investigated using electronic methods that require up-to-date techniques and knowledge of the latest software tools. Authors Linda Volonino, Jana Godwin, and Reynaldo Anzaldua share their expertise to give you the legal, technical, and investigative skills you need to launch your career in computer forensics. You can also use Computer Forensics: Principles and Practices to help you advance in careers such as criminal justice, accounting, law enforcement, and federal investigation.
Computer Forensics: Principles and Practicesgives you in-depth understanding of:
Using the correct investigative tools and procedures to maximize effectiveness of evidence gathering.
Keeping evidence in pristine condition so it will be admissible in a legal action.
· Investigating large-scale attacks such as identity theft, fraud, phishing, extortion, and malware infections.
The legal foundations for proper handling of traditional and electronic evidence such as the Federal Rules of Evidence and Procedure as well as the Fourth Amendment and other laws regarding search warrants and civil rights.
Practical tools such as FTK, EnCase, Passware, Ethereal, LADS, WinHex, GIMP, Camouflage, and Snort.
This book is filled with tools to help you move beyond simply learning concepts and help you apply them. These tools include:
· In Practice tutorials: Apply concepts and learn by doing.
· Exercises and Projects: Assignments show you how to employ your new skills.
Case Studies: Apply what you learn in real-world scenarios.
The companion Web site (www.prenhall.com/security) includes:
· Additional testing materials and projects to reinforce book lessons.
· Downloadable checklists and templates used in the book.
· Links to additional topics and resources to assist you in your professional development.