Learn Computer Forensics - Second Edition

Learn Computer Forensics - Second Edition

William Oettinger

70,18 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2022
ISBN:
9781803238302
70,18 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Desdémona
  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collectedKey Features:Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfullyRecord the digital evidence collected and organize a forensic examination on itPerform an assortment of Windows scientific examinations to analyze and overcome complex challengesBook Description:Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.This book will help you to build up the skills you need to work in a highly technical environment. This book’s ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process.By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.What You Will Learn:Explore the investigative process, rules of evidence, legal process, and ethical guidelinesUnderstand the difference between sectors, clusters, volumes, and file slackValidate forensic equipment, computer program, and examination methodsCreate and validate forensically sterile mediaGain the ability to draw conclusions based on the exam discoveriesRecord discoveries utilizing the technically correct terminologyDiscover the limitations and guidelines for RAM Capture and its toolsExplore timeline analysis, media analysis, string searches, and recovery of deleted dataWho this book is for:This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.

Artículos relacionados

  • Linux Kernel Programming - Second Edition
    Kaiwan N Billimoria / Kaiwan N. Billimoria
    Gain a solid practical understanding and sufficient theoretical insight into Linux kernel internals while learning to write high-quality kernel module code and understanding the complexities of kernel synchronizationPurchase of the print or Kindle book includes a free eBook in PDF format.Key Features:- Discover how to write Linux kernel and module code for real-world products o...
    Disponible

    74,52 €

  • The Ultimate Kali Linux Book - Third Edition
    Glen D. Singh
    Master the art of ethical hacking, from setting up labs and exploiting security vulnerabilities, to implementing Command and Control (C2) operations, this hands-on guide is your ultimate real-world pentesting companion.Key Features:- Execute sophisticated real-world penetration tests, exposing hidden vulnerabilities in enterprise networks- Explore Kali Linux’s capabilities with...
    Disponible

    81,08 €

  • Security Monitoring with Wazuh
    Rajneesh Gupta
    'This book equips you with the knowledge to effectively deploy and utilize Wazuh, helping your organization stay resilient against evolving cybersecurity threats.'- Santiago Bassett, Founder and CEO, WazuhKey Features:- Written by a cybersecurity expert recognized for his leadership and contributions in the industry- Gain practical insights on using Wazuh for threat protection ...
    Disponible

    62,40 €

  • Real-World Edge Computing
    Robert High / Sanjeev Gupta
    Learn how to use Linux Foundation’s LF Edge Open Horizon project to scale the deployment of your edge application and workload solution in a production environmentKey Features:- Explore historical trends, industries, use cases, and the evolving ecosystem of edge computing- Build your skills to recognize common issues that can derail a successful edge project- Understand the sym...
    Disponible

    55,59 €

  • Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition
    Brian van Baekel / Nathan Liefting
    Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and moreKey Features:- Master the redesigned frontend of Zabbix 7 with improved navigation and a streamlined menu structure- Automate alert workflows by integrating Zabbix with external services like Slack, Microsoft Teams, and OpsGenie- Perform prof...
    Disponible

    73,96 €

  • NFS Illustrated
    BRENT CALLAGHAN
    The Network File System (NFS) protocol that enables remote access to files is now a key element of any LAN. It is also currently and increasingly used as a key technology with the Web and wide area networks. Written for programmers creating NFS-based applications, network engineers creating new implementations of NFS, and network managers, NFS Illustrated promotes a thorough un...
    Disponible

    67,57 €

Otros libros del autor