Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: The Need for Computer Forensics
Real World Scenario-Tales from the Trenches: Why Computer Forensics Is Important
Chapter 2: Preparation-What to Do Before You Start
John Deutch
Real World Scenario-Tales from the Trenches: Preparation War Story
Real World Scenario-Former Employee of Local Internet Service Provider Sentenced to Prison for Computer Attack
Real World Scenario-Key Logging Scam Targets Bank Users
Chapter 3: Computer Evidence
Hot Java, Cold Jury
Real World Scenario-Tales from the Trenches: Computer Evidence
Software and Hardware Write Blockers
Chapter 4: Common Tasks
Who Will Use the Evidence You Collect?
What Else Can Hardware Tell You?
Real World Scenario-Tales from the Trenches: The Missing Man
Proving a Forensic Tool Is Safe
Chapter 5: Capturing the Data Image
Real World Scenario-Tales from the Trenches: Imaging
Chapter 6: Extracting Information from Data
IP Address Classes
Real World Scenario-The Case of Exposed Data
Real World Scenario-Tales from the Trenches: Hidden Evidence
Chapter 7: Passwords and Encryption
Real World Scenario-Who Are You, Really?
Real World Scenario-The Contract Ends Now!
Unauthorized Password Cracking is Illegal
Real World Scenario-Keeping Secrets
Real World Scenario-Tales from the Trenches: Opening Encrypted Files
Chapter 8: Common Forensics Tools
To Copy or Not to Copy?
Real World Scenario-Tales from the Trenches: Forensics Tools
Chapter 9: Pulling It All Together
Real World Scenario-Tales from the Trenches: Reports
Hacker Acquitted
Case #234-NextGard Technology Copyright Piracy Summary
Chapter 10: How to Testify in Court
Conflict of Interest
Real World Scenario-Tales from the Trenches: Testimony
Appendix C: Forensics Certifications
The Top Five Computer Forensics Certifications
Previous page
Table of content
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
Michael G. Solomon
,
K Rudolph
,
Ed Tittel
,
Neil Broom
,
Diane Barrett
BUY ON AMAZON
Project Management JumpStart
Building the Foundation
Planning and Acquiring Resources
Developing the Project Plan
Budgeting 101
Appendix C Sample Project Management Checklists
Inside Network Security Assessment: Guarding Your IT Infrastructure
Four Ways in Which You Can Respond to Risk
Why Risk Assessment
Making Sure You Are Ready to Begin
Tools Used for Assessments and Evaluations
Contents of a Good Report
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Basic ImageReady Animation, Tweening, and Layer Styles
Matte and Keying Plug-ins
Static Matte Painting in Photoshop
Motion Matte Painting in Photoshop
Custom Scene Transitions
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Building a Data Access Tier with ObjectRelationalBridge
Creating a Search Engine with Lucene
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Basic Commands to Get Started
Gaining Drawing Strategies: Part 2
Using Layers to Organize Your Drawing
Grouping Objects into Blocks
Controlling Text in a Drawing
Understanding Digital Signal Processing (2nd Edition)
UNDERSTANDING THE DFT EQUATION
DFT FREQUENCY AXIS
Appendix D. Mean, Variance, and Standard Deviation
Section E.1. USING LOGARITHMS TO DETERMINE RELATIVE SIGNAL POWER
Appendix G. Frequency Sampling Filter Derivations
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies