February 2026
Intermediate to advanced
456 pages
17h 3m
English
© PeachShutterStock/Shutterstock
| Chapter 1 | Introduction to Forensics |
| 1. C 2. B 3. B 4. C 5. B 6. D 7. B 8. B | |
| Chapter 2 | Overview of Computer Crime |
| 1. C 2. A 3. A 4. B 5. A 6. A 7. C 8. D | |
| Chapter 3 | Forensics Methods and Labs |
| 1. B 2. C 3. A 4. D 5. A 6. C 7. A | |
| Chapter 4 | Understanding Techniques for Hiding and Scrambling Information |
| 1. A 2. B 3. B 4. D 5. C 6. A 7. B 8. C 9. D 10. A 11. B 12. D | |
| Chapter 5 | Recovering Data |
| 1. B 2. C 3. A 4. A | |
| Chapter 6 | Windows Forensics |
| 1. A 2. C 3. A 4. A 5. B 6. A | |
| Chapter 7 | Linux Forensics |
| 1. A 2. B 3. A 4. C 5. C 6. pstree 7. A 8. C | |
| Chapter ... |
Read now
Unlock full access