Guide to computer forensics and investigations : processing digital evidence 🔍
Bill Nelson, Amelia Phillips, Christopher Steuart, Frank Enfinger
CENGAGE Learning Custom Publishing, 5th edition /, Boston, Massachusetts, 2016
英语 [en] · PDF · 46.7MB · 2016 · 📗 未知类型的图书 · 🚀/ia · Save
描述
xxv, 655 pages : 23 cm +
Combines all-encompassing topic coverage, authoritative information from seasoned experts, powerful instructor resources, and real-world student applications - delivering the comprehensive forensics resource
Previous edition: 2010
New to this edition: updated coverage on Linux and Macintosh; updated coverage on virtual machine software, such as VMware and Virtual Box; updated coverage on Android, mobile devices, and handheld devices; enhanced end-of-chapter exercises
Accompanying DVD-ROM (in back pocket) contains tutorials, project files and software tools
Includes bibliographical references and index
Understanding the digital forensics profession and investigations -- The investigator's office and laboratory -- Data acquisition -- Processing crime and incident scenes -- Working with Windows and CLI systems -- Current digital forensics tools -- Linux and Macintosh file systems -- Recovering graphics files -- Digital forensics analysis and validation -- Virtual machine forensics, live acquisitions, and network forensics -- E-mail and social media investigations -- Mobile device forensics -- Cloud forensics -- Report writing for high-tech investigations -- Expert testimony in digital investigations -- Ethics for the expert witness
Combines all-encompassing topic coverage, authoritative information from seasoned experts, powerful instructor resources, and real-world student applications - delivering the comprehensive forensics resource
Previous edition: 2010
New to this edition: updated coverage on Linux and Macintosh; updated coverage on virtual machine software, such as VMware and Virtual Box; updated coverage on Android, mobile devices, and handheld devices; enhanced end-of-chapter exercises
Accompanying DVD-ROM (in back pocket) contains tutorials, project files and software tools
Includes bibliographical references and index
Understanding the digital forensics profession and investigations -- The investigator's office and laboratory -- Data acquisition -- Processing crime and incident scenes -- Working with Windows and CLI systems -- Current digital forensics tools -- Linux and Macintosh file systems -- Recovering graphics files -- Digital forensics analysis and validation -- Virtual machine forensics, live acquisitions, and network forensics -- E-mail and social media investigations -- Mobile device forensics -- Cloud forensics -- Report writing for high-tech investigations -- Expert testimony in digital investigations -- Ethics for the expert witness
备选标题
Guide to Computer Forensics and Investigations (with DVD)
备选作者
Nelson, Bill, author; Phillips, Amelia, author; Steuart, Christopher, author
备用出版商
Boston, MA: Cengage Learning
备用版本
United States, United States of America
备用版本
Fifth edition, Boston, MA, 2016
备用版本
5. ed, Boston, MA, 2015
备用版本
5, 2015-01-15
元数据中的注释
cut text due to tight margin on some pages
obscured text on back cover
obscured text on back cover
开源日期
2023-06-28
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.