Hacking Exposed Computer Forensics: Secrets & Solutions

Front Cover
McGraw Hill Professional, 2005 - Computers - 444 pages
6 Reviews
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You値l get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It痴 all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you値l get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.

From inside the book

What people are saying - Write a review

User ratings

5 stars
3
4 stars
2
3 stars
0
2 stars
0
1 star
1

Review: Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions

User Review  - Roberto Travagliante - Goodreads

Chris Davis is a good author and this book is very interesting Read full review

Future Computer Forensic Scientists will approve

User Review  - 1georgiamom - Overstock.com

My daughter is becoming a computer forensic scientist and she really enjoyed this textbook. If you are interested in this field you can learn a lot about it. Read full review

Contents

Types of Investigations
6
Hacking Exposed Computer Forenslcs Secrets Solutions
48
The Collections Agency
56
Copyright

16 other sections not shown

Common terms and phrases

References to this book

All Book Search results »

About the author (2005)

Chris Davis, (Carrollton, TX) CISSP, is a Computer Forensics Examiner for Texas Instruments.

Aaron Philipp, (Austin, TX) CISSP, has extensive experience in the field of Forensics.

Dave Cowen, (Richardson, TX) CISSP, has extensive experience and training in security research, application security testing, penetration testing and computer forensic analysis in both computer and telecommunications systems and software.

Bibliographic information