Image from Google Jackets

Computer forensics jumpstart [electronic resource] / Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, Indiana : Wiley Publishing, Inc. [2011], Ã2011.Edition: Second editionDescription: xx, 316 pages : illustrations ; 24 cmISBN:
  • 9780470931660
  • 0470931663
Other title:
  • JumpStart
Uniform titles:
  • Computer forensics jumpstart (Online)
Subject(s): Genre/Form: DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 S6556 2011
Contents:
The need for computer forensics -- Preparation--what to do before you start -- Computer evidence -- Common tasks -- Capturing the data image -- Extracting information from data -- Passwords and encryption -- Common forensics tools -- Pulling it all together -- How to testify in court -- Appendix A: answers to review questions -- Appendix B: forensics resources -- Appendix C: forensics certifications -- Appendix D: forensics tools.
Summary: A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books MAIN General AUE Library Collection QA76.9 .A25 S6556 2011 (Browse shelf(Opens below)) 1 Available 14084321
Browsing MAIN shelves, Shelving location: General, Collection: AUE Library Collection Close shelf browser (Hides shelf browser)
QA76.9.A25 S652 2013 Elementary information security / QA76.9 .A25 S6556 2005 Computer forensics jumpstart / QA76.9 .A25 S6556 2005 Computer forensics jumpstart / QA76.9 .A25 S6556 2011 Computer forensics jumpstart QA76.9 .A25 S658 2011 Security strategies in Windows platforms and applications QA76.9 .A25 S685 2015 Computer security : QA76.9 .A25 S685 2015 Computer security :

Includes bibliographical references and index.

The need for computer forensics -- Preparation--what to do before you start -- Computer evidence -- Common tasks -- Capturing the data image -- Extracting information from data -- Passwords and encryption -- Common forensics tools -- Pulling it all together -- How to testify in court -- Appendix A: answers to review questions -- Appendix B: forensics resources -- Appendix C: forensics certifications -- Appendix D: forensics tools.

Access restricted to BGSU students, faculty and staff.

A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools.

There are no comments on this title.

to post a comment.