Book description
Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.
You’ll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource.
Computer Forensics: InfoSec Pro Guide features:
- Lingo—Common security terms defined so that you’re in the know on the job
- IMHO—Frank and relevant opinions based on the author’s years of industry experience
- Budget Note—Tips for getting security technologies and processes into your organization’s budget
- In Actual Practice—Exceptions to the rules of security explained in real-world contexts
- Your Plan—Customizable checklists you can use on the job now
- Into Action—Tips on how, why, and when to apply new skills and techniques at work
Table of contents
- Cover
- About the Author
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
-
PART I: Getting Started
- Chapter 1: What Is Computer Forensics?
- Chapter 2: Learning Computer Forensics
- Chapter 3: Creating a Lab
-
PART II: Your First Investigation
- Chapter 4: How to Approach a Computer Forensics Investigation
- Chapter 5: Choosing Your Procedures
- Chapter 6: Testing Your Tools
- Chapter 7: Live vs. Postmortem Forensics
- Chapter 8: Capturing Evidence
- Chapter 9: Nontraditional Digital Forensics
-
PART III: Case Examples: How to Work a Case
- Chapter 10: Establishing the Investigation Type and Criteria
- Chapter 11: Human Resources Cases
- Chapter 12: Administrator Abuse
- Chapter 13: Stealing Information
- Chapter 14: Internal Leaks
- Chapter 15: Keyloggers and Malware
- PART IV: Defending Your Work
- InfoSec Pro Series: Glossary
- Index
Product information
- Title: Computer Forensics InfoSec Pro Guide
- Author(s):
- Release date: April 2013
- Publisher(s): McGraw-Hill
- ISBN: 9780071742467
You might also like
book
Computer Forensics
Presenting background information in computer and information systems and their use in the cyber environment, this …
video
Computer Forensics
This video based Computer Forensics training course expert Ric Messier will teach you how to get …
book
Computer Forensics JumpStart, Second Edition
Essential reading for launching a career in computer forensics Internet crime is on the rise, catapulting …
book
Computer Forensics: A Pocket Guide
How would your organisation cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer …