Computer Forensics For Dummies (For Dummies (Computer/Tech)) 🔍
Linda Volonino and Reynaldo Anzaldua
For Dummies, For Dummies Series, 1., 2008
英语 [en] · EPUB · 3.4MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies ! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won&;t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You&;ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You&;ll discover how to use the latest forensic software, tools, and equipment to find the answers that you&;re looking for in record time. When you understand how data is stored, encrypted, and recovered, you&;ll be able to protect your personal privacy as well. By the time you finish reading this book, you&;ll know how to:
Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents&; methods Handle passwords and encrypted data Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents&; methods Handle passwords and encrypted data Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
备用文件名
lgli/Z:\Bibliotik_\13\C\%&Ovr0/Computer Forensics For Dummies - Linda Volonino.epub
备用文件名
nexusstc/Computer Forensics for Dummies/9e212eba23acbd92314171934b8ebd7c.epub
备用文件名
lgrsnf/Computer Forensics For Dummies - Linda Volonino.epub
备用文件名
zlib/Computers/Networking/Linda Volonino/Computer Forensics for Dummies_5562401.epub
备选标题
Computer Forensics For Dummies®
备选作者
Pollard, Carol, Anzaldua, Reynaldo
备选作者
Carol Pollard; Reynaldo Anzaldua
备用出版商
Wiley; John Wiley [distributor]
备用出版商
John Wiley & Sons, Incorporated
备用出版商
Spectrum Publications
备用出版商
Halsted Press
备用版本
--For dummies, --For dummies, Hoboken, NJ, New Jersey, 2008
备用版本
John Wiley & Sons, Inc. (trade), Hoboken, N.J., 2008
备用版本
--For dummies, Online-ausg, Hoboken, N.J, 2008
备用版本
United States, United States of America
备用版本
1, PS, 2008
元数据中的注释
lg2538764
元数据中的注释
{"edition":"1.","isbns":["0470371919","9780470371916"],"last_page":386,"publisher":"For Dummies","series":"For Dummies Series"}
备用描述
Introduction -- Pt. I:
Digging out and documenting electronic evidence --
Knowing what your digital devices create, capture, and pack away -- until revelation day --
Suiting up for a lawsuit or criminal investigation --
Getting authorized to search and seize --
Documenting and managing the crime scene -- -- Pt. II:
Preparing to crack the case --
Minding and finding the loopholes --
Acquiring and authenticating e-evidence --
Examining e-evidence --
Extracting hidden data -- -- Pt. III:
Doing computer forensics investigations --
E-mail and web forensics --
Data forensics --
Document forensics --
Mobile forensics --
Network forensics --
Investigating x-files: exotic forensics -- -- Pt. IV:
Succeeding in court --
Holding up your end at pretrial --
Winning a case before you go to court --
Standing your ground in court -- -- Pt. V: The
Part of tens --
Ten ways to get qualified and prepped for success --
Ten tactics of an excellent investigator and a dangerous expert witness --
Ten cool tools for computer forensics ---- Glossary-- Index.
Digging out and documenting electronic evidence --
Knowing what your digital devices create, capture, and pack away -- until revelation day --
Suiting up for a lawsuit or criminal investigation --
Getting authorized to search and seize --
Documenting and managing the crime scene -- -- Pt. II:
Preparing to crack the case --
Minding and finding the loopholes --
Acquiring and authenticating e-evidence --
Examining e-evidence --
Extracting hidden data -- -- Pt. III:
Doing computer forensics investigations --
E-mail and web forensics --
Data forensics --
Document forensics --
Mobile forensics --
Network forensics --
Investigating x-files: exotic forensics -- -- Pt. IV:
Succeeding in court --
Holding up your end at pretrial --
Winning a case before you go to court --
Standing your ground in court -- -- Pt. V: The
Part of tens --
Ten ways to get qualified and prepped for success --
Ten tactics of an excellent investigator and a dangerous expert witness --
Ten cool tools for computer forensics ---- Glossary-- Index.
备用描述
A guide to the basics of computer forensics covers such topics as acquiring and examining e-evidence, extracting hidden data, filtering data, handling passwords and encrypted data, and exhibiting evidence in court-- source other than Library of Congress
开源日期
2020-06-09
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.