Asia Pacific University Library catalogue


System forensics, investigation, and response / Chuck Easttom.

By: Easttom, ChuckMaterial type: TextTextPublication details: Burlington, MA : Jones & Bartlett Learning, [2019]Edition: 3rd edDescription: xvi, 335 p. : ill. ; 23 cmISBN: 9781284121841 (pbk.)Subject(s): Computer crimes -- Investigation -- TextbooksDDC classification: 363.25/968 LOC classification: HV8079.C65 | E37 2019
Contents:
Introduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
Staff Circulation Staff Circulation APU Library
Open Shelf
Book HV8079.C65 E37 2019 c.1 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00037542
General Circulation General Circulation APU Library
Open Shelf
Book HV8079.C65 E37 2019 c.2 (Browse shelf (Opens below)) 2 Checked out 11/10/2024 00037543

Revised edition of the author's System forensics, investigation, and response, c2014.

Introduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.

There are no comments on this title.

to post a comment.