Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: The Need for Computer Forensics
Real World Scenario-Tales from the Trenches: Why Computer Forensics Is Important
Chapter 2: Preparation-What to Do Before You Start
John Deutch
Real World Scenario-Tales from the Trenches: Preparation War Story
Real World Scenario-Former Employee of Local Internet Service Provider Sentenced to Prison for Computer Attack
Real World Scenario-Key Logging Scam Targets Bank Users
Chapter 3: Computer Evidence
Hot Java, Cold Jury
Real World Scenario-Tales from the Trenches: Computer Evidence
Software and Hardware Write Blockers
Chapter 4: Common Tasks
Who Will Use the Evidence You Collect?
What Else Can Hardware Tell You?
Real World Scenario-Tales from the Trenches: The Missing Man
Proving a Forensic Tool Is Safe
Chapter 5: Capturing the Data Image
Real World Scenario-Tales from the Trenches: Imaging
Chapter 6: Extracting Information from Data
IP Address Classes
Real World Scenario-The Case of Exposed Data
Real World Scenario-Tales from the Trenches: Hidden Evidence
Chapter 7: Passwords and Encryption
Real World Scenario-Who Are You, Really?
Real World Scenario-The Contract Ends Now!
Unauthorized Password Cracking is Illegal
Real World Scenario-Keeping Secrets
Real World Scenario-Tales from the Trenches: Opening Encrypted Files
Chapter 8: Common Forensics Tools
To Copy or Not to Copy?
Real World Scenario-Tales from the Trenches: Forensics Tools
Chapter 9: Pulling It All Together
Real World Scenario-Tales from the Trenches: Reports
Hacker Acquitted
Case #234-NextGard Technology Copyright Piracy Summary
Chapter 10: How to Testify in Court
Conflict of Interest
Real World Scenario-Tales from the Trenches: Testimony
Appendix C: Forensics Certifications
The Top Five Computer Forensics Certifications
Previous page
Table of content
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
Michael G. Solomon
,
K Rudolph
,
Ed Tittel
,
Neil Broom
,
Diane Barrett
BUY ON AMAZON
Strategies for Information Technology Governance
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
Governance Structures for IT in the Health Care Industry
C++ GUI Programming with Qt 3
Implementing the Edit Menu
Basic Layouts
Advanced Clipboard Handling
Tooltips, Status Tips, and Whats This? Help
Using ActiveX
Mastering Delphi 7
Working with Forms
The Architecture of Delphi Applications
Reporting with Rave
Web Programming with IntraWeb
Delphi for .NET Preview: The Language and the RTL
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Fashion Logistics and Quick Response
Logistics in Tesco: Past, Present and Future
The Development of E-tail Logistics
Transforming Technologies: Retail Exchanges and RFID
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 1
Grouping Objects into Blocks
Dimensioning a Drawing
Managing External References
Printing an AutoCAD Drawing
Python Standard Library (Nutshell Handbooks) with
Overview
Overview
The sunau Module
The winsound Module
Data Storage
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies