Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

The Best Damn Cybercrime and Digital Forensics Book Period

The Best Damn Cybercrime and Digital Forensics Book Period

Hot Research Book in The Best Damn Cybercrime and Digital Forensics Book Period

Author(s) Name:  Jack Wiles, Anthony Reyes

About the Book:

   Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible.
   This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.

Table of contents

  • Chapter 1 - Computer Forensics in Today-s World
  • Chapter 2 - Digital Forensics: An Overview
  • Chapter 3 - Developing an Enterprise Digital Investigative/Electronic Discovery Capability
  • Chapter 4 - Integrating a Quality Assurance Program in a Digital Forensic Laboratory
  • Chapter 5 - Balancing E-discovery Challenges with Legal and IT Requirements
  • Chapter 6 - Forensic Software and Hardware
  • Chapter 7 - Incident Response: Live Forensics and Investigations
  • Chapter 8 - Seizure of Digital Information
  • Chapter 9 - Conducting Cyber Investigations
  • Chapter 10 - Acquiring Data, Duplicating Data, and Recovering Deleted Files
  • Chapter 11 - Forensic Discovery and Analysis Using BackTrack
  • Chapter 12 - Windows, Linux, and Macintosh Boot Processes
  • Chapter 13 - Windows and Linux Forensics
  • Chapter 14 - Investigating Network Traffic and Investigating Logs
  • Chapter 15 - Router Forensics and Network Forensics
  • Chapter 16 - Investigating Wireless Attacks
  • Chapter 17 - E-mail Forensics
  • Chapter 18 - Steganography and Application Password Crackers
  • Chapter 19 - PDA and Blackberry
  • Chapter 20 - MP3 Forensics
  • ISBN:  9781597492287

    Publisher:  Syngress

    Year of Publication:  2007

    Book Link:  Home Page Url