GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /

The most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testi...

Full description

Bibliographic Details
Main Authors: Nelson, Bill, author, Phillips, Amelia, author, Steuart, Christopher, author
Format:
Language:eng
Published: Boston, MA : Cengage, 2019
Subjects:
_version_ 1796761562745143296
author Nelson, Bill, author
Phillips, Amelia, author
Steuart, Christopher, author
author_facet Nelson, Bill, author
Phillips, Amelia, author
Steuart, Christopher, author
author_sort Nelson, Bill, author
collection OCEAN
description The most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.
first_indexed 2024-03-05T16:28:06Z
format
id KOHA-OAI-TEST:558876
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:28:06Z
publishDate 2019
publisher Boston, MA : Cengage,
record_format dspace
spelling KOHA-OAI-TEST:5588762020-12-19T17:21:08ZGUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / Nelson, Bill, author Phillips, Amelia, author Steuart, Christopher, author Boston, MA : Cengage,2019engThe most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.Includes bibliographical references (pages 685-690) and index.The most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.PSZJBLComputer crimesComputer security URN:ISBN:9781337568944
spellingShingle Computer crimes
Computer security
Nelson, Bill, author
Phillips, Amelia, author
Steuart, Christopher, author
GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /
title GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /
title_full GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /
title_fullStr GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /
title_full_unstemmed GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /
title_short GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /
title_sort guide to computer forensics and investigations
topic Computer crimes
Computer security
work_keys_str_mv AT nelsonbillauthor guidetocomputerforensicsandinvestigations
AT phillipsameliaauthor guidetocomputerforensicsandinvestigations
AT steuartchristopherauthor guidetocomputerforensicsandinvestigations