Logo
FULIOPAC 

FOUNDATION UNIVERSITY LIBRARY INTEGRATED ONLINE PUBLIC ACCESS CATALOG

 Home  About Us   Libraries   Services  AI (Artificial Intelligence)  FULELR   FULOG-InS  CoRe   e-Books e-Resources  Databases   Gale Complete  Gender&Development  Thesis/Dissertation   BP/Capstone/FS   DigiLib   Lists   CourseReserves   FilOnline  
Image from Google Jackets

Digital forensics, investigation, and response / by Chuck Easttom.

By: Material type: TextTextPublisher: Burlington, Massachusetts : Jones & Bartlett Learning, [2022]Edition: Fourth editionDescription: xix, 403 pages ; illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781284226065
Uniform titles:
  • System forensics, investigation, and response
Subject(s): DDC classification:
  • 363.25968 Ea79 2022
LOC classification:
  • HV8079.C65 E37 2022
Contents:
Part One Introduction to Forensics Chapter 1 Introduction to Forensics Chapter 2 Overview of Computer Crime Chapter 3 Forensic Methods and Labs Part Two Forensics Tools, Techniques, and Methods Chapter 4 Collecting, Seizing, and Protecting Evidence Chapter 5 Understanding Techniques for Hiding and Scrambling Information Chapter 6 Recovering Data Chapter 7 Incident and Intrusion Response Part Three Branches of Digital Forensics Chapter 8 Windows Forensics Chapter 9 Linux Forensics Chapter 10 Macintosh Forensics Chapter 11 Email Forensics Chapter 12 Mobile Forensics Chapter 13 Network Forensics Chapter 14 Memory Forensic
Summary: "Digital Forensics, Investigation, and Response provides a solid, broad grounding in digital forensics. The text is divided into three parts: Part I introduces forensics; Part II provides a technical overview; and Part III covers advanced topics"-- Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources. Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device." --Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Books Books Foundation University Library Circulation Circ 363.25968 Ea79 2022 (Browse shelf(Opens below)) Available 63139

Tables.

Includes index.

Part One Introduction to Forensics
Chapter 1 Introduction to Forensics
Chapter 2 Overview of Computer Crime
Chapter 3 Forensic Methods and Labs
Part Two Forensics Tools, Techniques, and Methods
Chapter 4 Collecting, Seizing, and Protecting Evidence
Chapter 5 Understanding Techniques for Hiding and Scrambling Information
Chapter 6 Recovering Data
Chapter 7 Incident and Intrusion Response
Part Three Branches of Digital Forensics
Chapter 8 Windows Forensics
Chapter 9 Linux Forensics
Chapter 10 Macintosh Forensics
Chapter 11 Email Forensics
Chapter 12 Mobile Forensics
Chapter 13 Network Forensics
Chapter 14 Memory Forensic

"Digital Forensics, Investigation, and Response provides a solid, broad grounding in digital forensics. The text is divided into three parts: Part I introduces forensics; Part II provides a technical overview; and Part III covers advanced topics"--

Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources.

Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device." --Provided by publisher.

There are no comments on this title.

to post a comment.