享·阅读
图书信息:
0次推荐
58次浏览
0次下载
书名: Computer Forensics For Dummies
作者: Volonino, Linda; Anzaldua, Reynaldo
出版时间: 2008-10-10
ISBN: 9780470371916(P-ISBN) ,9780470434956(O-ISBN)
摘要:
摘要:
书目详情:
Computer Forensics For DummiesAbout the AuthorsDedicationAuthors’ AcknowledgmentsContents at a GlanceTable of ContentsIntroductionWho Should Read This Book?About This BookHow to Use This BookWhat You Don’t Need to ReadFoolish AssumptionsHow This Book Is OrganizedAbout the Web Site and BlogIcons Used in This BookWhere to Go from HerePart I: Digging Out and Documenting Electronic EvidenceChapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away — Until Revelation DayLiving and Working in a Recorded WorldGiving the Third Degree to Computers, Electronics, and the InternetAnswering the Big QuestionsExamining Investigative MethodsRevealing Investigation ResultsChapter 2: Suiting Up for a Lawsuit or Criminal InvestigationDeciphering the Legal CodesManaging E-DiscoveryConducting the Investigation in Good FaithDeciding Who’s Paying the BillChapter 3: Getting Authorized to Search and SeizeGetting Authority: Never Start Without ItCriminal Cases: Papering Your Behind CYA)Civil Cases: Verifying Company PolicyChapter 4: Documenting and Managing the Crime SceneObsessing over DocumentationDirecting the SceneManaging Evidence Behind the Yellow TapeStepping Through the ScenePart II: Preparing to Crack the CaseChapter 5: Minding and Finding the LoopholesDeciding to Take On a ClientDetermining Whether You Can Help the CasePassing the Court’s Standard As a Reliable WitnessGoing Forward with the CaseKeeping a Tight Forensic DefenseChapter 6: Acquiring and Authenticating E-EvidenceAcquiring E-Evidence ProperlyStep 1: Determine the Type of Media You’re Working WithStep 2: Find the Right ToolStep 3: Transfer DataStep 4: Authenticate the Preserved DataStep 5: Make a Duplicate of the DuplicateChapter 7: Examining E-EvidenceThe Art of Scientific InquiryGearing Up for ChallengesGetting a Handle on Search TermsChallenging Your Results: Plants and Frames and Being in the Wrong PlaceFinding No EvidenceReporting Your AnalysisChapter 8: Extracting Hidden DataRecognizing Attempts to Blind the InvestigatorDefeating Algorithms, Hashes, and KeysFinding Out-of-Sight BytesCracking PasswordsDecrypting the EncryptedPart III: Doing Computer Forensics InvestigationsChapter 9: E-Mail and Web ForensicsOpening Pandora’s Box of E-MailScoping Out E-Mail ArchitectureSeeing the E-Mail Forensics PerspectiveExamining Client-Based E-MailInvestigating Web-Based MailSearching Browser FilesLooking through Instant MessagesChapter 10: Data ForensicsDelving into Data StorageFinding Digital Cavities Where Data HidesExtracting DataRebuilding Extracted DataChapter 11: Document ForensicsFinding Evidential Material in Documents: MetadataHoning In on CAM Create, Access, Modify) FactsDiscovering DocumentsChapter 12: Mobile ForensicsKeeping Up with Data on the MoveMaking a Device SeizureCutting-Edge Cellular ExtractionsChapter 13: Network ForensicsMobilizing Network Forensic PowerIdentifying Network ComponentsSaving Network DataRe-Creating an Event from TrafficLooking at Network Forensic ToolsDiscovering Network Forensic VendorsChapter 14: Investigating X-Files: eXotic ForensicsTaking a Closer Look at Answering MachinesExamining Video Surveillance SystemsCracking Home Security SystemsTracking AutomobilesExtracting Information from Radio Frequency Identification RFID)Examining CopiersTaking a Look On the HorizonPart IV: Succeeding in CourtChapter 15: Holding Up Your End at PretrialPretrial MotionsHandling Pretrial HearingsGiving a DepositionChapter 16: Winning a Case Before You Go to CourtWorking Around Wrong MovesResponding to Opposing ExpertsChapter 17: Standing Your Ground in CourtMaking Good on DeliverablesUnderstanding Barroom Brawls in the CourtroomPresenting E-Evidence to PersuadeCommunicating to the CourtPart V: The Part of TensChapter 18: Ten Ways to Get Qualified and Prepped for SuccessThe Front Ten: CertificationsThe Back Ten: Journals and EducationChapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert WitnessStick to Finding and Telling the TruthDon’t Fall for Counsel’s Tricks in CourtBe IrrefutableSubmit a Descriptive, Complete BillPrepare a Clear, Complete ReportUnderstand Nonverbal CuesLook ’Em Straight in the EyeDress for Your Role As a ProfessionalStay Certified and Up-to-DateKnow When to Say NoChapter 20: Ten Cool Tools for Computer ForensicsComputer Forensic Software ToolsComputer Forensic HardwareComputer Forensic LaboratoriesGlossaryIndex
评论:
南京大学志愿者
点击向他求书按钮,直接QQ联系图书馆志愿者。
南京大学
计算机科学与技术
他下载过此书,你可以像他求助 他下载过《这本电子书》,你可以向他求助

求书成功!

提示
您的信息不完善,将无法进行求书,点击确定完善个人信息!
footer
提示: 请按照要求填写内容
提示
您将删除与此条信息有关的所有信息!!!