Ebook: The Official CHFI Study Guide (Exam 312-49). For Computer Hacking Forensics Investigators
- Year: 2007
- Publisher: Syngress Pub
- City: Burlington, MA
- Language: English
- pdf
Content:
Technical Editor, Page iii
Contributors, Pages iii-vi
Chapter 1 - Computer Forensics in Today's World, Pages 1-60
Chapter 2 - Systems, Disks, and Media, Pages 61-131
Chapter 3 - The Computer Investigation Process, Pages 133-195
Chapter 4 - Acquiring Data, Duplicating Data, and Recovering Deleted Files, Pages 197-263
Chapter 5 - Windows, Linux, and Macintosh Boot Processes, Pages 265-285
Chapter 6 - Windows and Linux Forensics, Pages 287-349
Chapter 7 - Steganography and Application Password Crackers, Pages 351-386
Chapter 8 - Computer-Assisted Attacks and Crimes, Pages 387-439
Chapter 9 - Investigating Network Traffic and Investigating Logs, Pages 441-467
Chapter 10 - Router Forensics and Network Forensics, Pages 469-485
Chapter 11 - Investigating Wireless Attacks, Pages 487-509
Chapter 12 - PDA, Blackberry, and iPod Forensics, Pages 511-542
Chapter 13 - Forensic Software and Hardware, Pages 543-616
Chapter 14 - Forensics Investigation Using EnCase, Pages 617-673
Chapter 15 - Incident Response, Pages 675-705
Chapter 16 - Types of Investigations, Pages 707-811
Appendix A - Becoming an Expert Witness, Pages 813-860
Appendix B - Worldwide Forensic Acts and Laws, Pages 861-920
Index, Pages 921-939
Technical Editor, Page iii
Contributors, Pages iii-vi
Chapter 1 - Computer Forensics in Today's World, Pages 1-60
Chapter 2 - Systems, Disks, and Media, Pages 61-131
Chapter 3 - The Computer Investigation Process, Pages 133-195
Chapter 4 - Acquiring Data, Duplicating Data, and Recovering Deleted Files, Pages 197-263
Chapter 5 - Windows, Linux, and Macintosh Boot Processes, Pages 265-285
Chapter 6 - Windows and Linux Forensics, Pages 287-349
Chapter 7 - Steganography and Application Password Crackers, Pages 351-386
Chapter 8 - Computer-Assisted Attacks and Crimes, Pages 387-439
Chapter 9 - Investigating Network Traffic and Investigating Logs, Pages 441-467
Chapter 10 - Router Forensics and Network Forensics, Pages 469-485
Chapter 11 - Investigating Wireless Attacks, Pages 487-509
Chapter 12 - PDA, Blackberry, and iPod Forensics, Pages 511-542
Chapter 13 - Forensic Software and Hardware, Pages 543-616
Chapter 14 - Forensics Investigation Using EnCase, Pages 617-673
Chapter 15 - Incident Response, Pages 675-705
Chapter 16 - Types of Investigations, Pages 707-811
Appendix A - Becoming an Expert Witness, Pages 813-860
Appendix B - Worldwide Forensic Acts and Laws, Pages 861-920
Index, Pages 921-939
Download the book The Official CHFI Study Guide (Exam 312-49). For Computer Hacking Forensics Investigators for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)