System Forensics, Investigation, and Response

System Forensics, Investigation, and Response

eBook - 2019
Rate this:
Jones
& Bartlett Learning

Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Part II addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, Part III explores emerging technologies as well as future directions of this interesting and cutting-edge field.


KEY FEATURES:
• Covers all aspects of forensics: procedures, legal issues, and scientific principles as well as specific hands on forensics with Windows, smart phones, memory, network forensics, and Macintosh forensics
• New and expanded content on mobile device forensics, addressing the most current issues
• Additional information on memory forensics
• Updated and expanded coverage on legal issues
• Significantly expanded material on Windows forensics
• Includes information on how to write reports
• Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenari


Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more: http://www.issaseries.com/

Book News
In a textbook for courses and curricula in information technology security, Easttom explains how to find and follow evidence on computer, not only to investigate cybercrime, but also for incident response. He begins by examining the fundamentals of computer system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and laboratories. Then he describes the tools, techniques, and methods used to perform computer forensics and investigation, including collecting evidence, investigating information hiding, recovering data, and scrutinizing email. He also discusses how to perform forensics in the Windows, Linux, and Macintosh operating systems; on mobile devices; and on networks. In the final part, he explores incident and intrusion response, emerging technologies, and future directions. Annotation ©2017 Ringgold, Inc., Portland, OR (protoview.com)

Publisher: Burlington, MA :, Jones & Bartlett Learning,, [2019]
Edition: Third edition
Copyright Date: ©2019
ISBN: 9781284121858
1284121852
9781284121841
Characteristics: 1 online resource (1 volume) : illustrations

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Recommendations

Subject Headings

  Loading...

Find it at SMCL

  Loading...
[]
[]
To Top