WINDOWS FORENSICS:THE FIELD GUIDE FOR CONDUCTING CORPORATE COMPUTER INVESTIGATIONS PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download WINDOWS FORENSICS:THE FIELD GUIDE FOR CONDUCTING CORPORATE COMPUTER INVESTIGATIONS PDF full book. Access full book title WINDOWS FORENSICS:THE FIELD GUIDE FOR CONDUCTING CORPORATE COMPUTER INVESTIGATIONS by Chad Steel. Download full books in PDF and EPUB format.

WINDOWS FORENSICS:THE FIELD GUIDE FOR CONDUCTING CORPORATE COMPUTER INVESTIGATIONS

WINDOWS FORENSICS:THE FIELD GUIDE FOR CONDUCTING CORPORATE COMPUTER INVESTIGATIONS PDF Author: Chad Steel
Publisher: John Wiley & Sons
ISBN: 9788126510368
Category :
Languages : en
Pages : 408

Book Description
Market_Desc: · Technology professionals charged with security in corporate, government, and enterprise settings. Special Features: · Step-by-step guide for IT professionals who must conduct constant computer investigations in the face of constant computer attacks such as phishing , which create virus plagued enterprise systems· Unique coverage not found in other literature: what it takes to become a forensic analyst; how to conduct an investigation; peer-to-peer, IM, and browser (including FireFox) forensics; and Lotus Notes forensics (Notes still holds 40% of the Fortune 100 market). · Author has strong corporate and government contacts and experience About The Book: The book can best be described as a handbook and guide for conducting computer investigations in a corporate setting, with a focus on the most prevalent operating system (Windows). The book is supplemented with sidebar/callout topics of current interest with greater depth, and actual case studies. The organization is broken into 3 sections as follows:The first section is a brief on the emerging field of computer forensics, what it takes to become a forensic analyst, and the basics for what s needed in a corporate forensics setting. The Windows operating system family is comprised of several complex pieces of software. This section focuses specifically on the makeup of Windows from a forensic perspective, and details those components which will be analyzed in later chapters.Leveraging the contents of sections 1 and 2, this section brings together the investigative techniques from section 1 and the Windows specifics of section 2 and applies them to real analysis actions.