Computer forensics for dummies
著者
書誌事項
Computer forensics for dummies
(--For dummies)
John Wiley & Sons, c2008
電子リソースにアクセスする 全1件
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
内容説明・目次
内容説明
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You'll discover how to use the latest forensic software, tools, and equipment to find the answers that you're looking for in record time. When you understand how data is stored, encrypted, and recovered, you'll be able to protect your personal privacy as well. By the time you finish reading this book, you'll know how to:
Prepare for and conduct computer forensics investigations
Find and filter data
Protect personal privacy
Transfer evidence without contaminating it
Anticipate legal loopholes and opponents' methods
Handle passwords and encrypted data
Work with the courts and win the case
Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
目次
Introduction. Part I: Digging Out and Documenting Electronic Evidence.
Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away - Until Revelation Day.
Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation.
Chapter 3: Getting Authorized to Search and Seize.
Chapter 4: Documenting and Managing the Crime Scene.
Part II: Preparing to Crack the Case.
Chapter 5: Minding and Finding the Loopholes.
Chapter 6: Acquiring and Authenticating E-Evidence.
Chapter 7: Examining E-Evidence.
Chapter 8: Extracting Hidden Data.
Part III: Doing Computer Forensic Investigations.
Chapter 9: E-Mail and Web Forensics.
Chapter 10: Data Forensics.
Chapter 11: Document Forensics.
Chapter 12: Mobile Forensics.
Chapter 13: Network Forensics.
Chapter 14: Investigating X-Files: eXotic Forensics.
Part IV: Succeeding in Court.
Chapter 15: Holding Up Your End at Pretrial.
Chapter 16: Winning a Case Before You Go to Court.
Chapter 17: Standing Your Ground in Court.
Part V: The Part of Tens.
Chapter 18: Ten Ways to Get Qualifi ed and Prepped for Success.
Chapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness.
Chapter 20: Ten Cool Tools for Computer Forensics.
Glossary.
Index.
「Nielsen BookData」 より