Computer forensics jumpstart / Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett.
Material type: TextPublication details: Indianapolis, Indiana : Wiley Publishing, Inc. [2011], ♭2011.Edition: Second editionDescription: xx, 316 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9780470931660
- 0470931663
- JumpStart
- 005.8 23
- QA76.9.A25 S6556 2011
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | Kwara State University Library | QA76.9 .C66 2011 (Browse shelf(Opens below)) | Available | 007626-01 | ||
Books | Kwara State University Library | QA76.9 .C66 2011 (Browse shelf(Opens below)) | Available | 007626-02 | ||
Books | Kwara State University Library | QA76.9 .C66 2011 (Browse shelf(Opens below)) | Available | 007626-03 | ||
Books | Kwara State University Library | QA76.9 .C66 2011 (Browse shelf(Opens below)) | Available | 007626-04 |
Browsing Kwara State University Library shelves Close shelf browser (Hides shelf browser)
QA76.9 .C65 L38 2015 Simulation modeling and analysis / | QA76.9 .C66 2011 Computer forensics jumpstart / | QA76.9 .C66 2011 Computer forensics jumpstart / | QA76.9 .C66 2011 Computer forensics jumpstart / | QA76.9 .C66 2011 Computer forensics jumpstart / | QA76.9.C66 2011 Computer forensics jumpstart / | QA76.9.C66 2011 Computer forensics jumpstart / |
Includes bibliographical references and index.
The need for computer forensics -- Preparation--what to do before you start -- Computer evidence -- Common tasks -- Capturing the data image -- Extracting information from data -- Passwords and encryption -- Common forensics tools -- Pulling it all together -- How to testify in court -- Appendix A: answers to review questions -- Appendix B: forensics resources -- Appendix C: forensics certifications -- Appendix D: forensics tools.
A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools.
There are no comments on this title.