Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. This title teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. It includes chapters dedicated to networked Windows, and Unix, and Macintosh computers.
A collection that details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. It provides guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation.
Covers the field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. This book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.