GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS /
The most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testi...
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
Boston, MA : Cengage,
2019
|
Subjects: |
_version_ | 1796761562745143296 |
---|---|
author | Nelson, Bill, author Phillips, Amelia, author Steuart, Christopher, author |
author_facet | Nelson, Bill, author Phillips, Amelia, author Steuart, Christopher, author |
author_sort | Nelson, Bill, author |
collection | OCEAN |
description | The most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice. |
first_indexed | 2024-03-05T16:28:06Z |
format | |
id | KOHA-OAI-TEST:558876 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:28:06Z |
publishDate | 2019 |
publisher | Boston, MA : Cengage, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5588762020-12-19T17:21:08ZGUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / Nelson, Bill, author Phillips, Amelia, author Steuart, Christopher, author Boston, MA : Cengage,2019engThe most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.Includes bibliographical references (pages 685-690) and index.The most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.PSZJBLComputer crimesComputer security URN:ISBN:9781337568944 |
spellingShingle | Computer crimes Computer security Nelson, Bill, author Phillips, Amelia, author Steuart, Christopher, author GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / |
title | GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / |
title_full | GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / |
title_fullStr | GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / |
title_full_unstemmed | GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / |
title_short | GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS / |
title_sort | guide to computer forensics and investigations |
topic | Computer crimes Computer security |
work_keys_str_mv | AT nelsonbillauthor guidetocomputerforensicsandinvestigations AT phillipsameliaauthor guidetocomputerforensicsandinvestigations AT steuartchristopherauthor guidetocomputerforensicsandinvestigations |