Computer Forensics For Dummies
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.
You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to:
Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
What people are saying - Write a review
Knowing What Your Digital Devices Create Capture
Suiting Up for a Lawsuit or Criminal Investigation
Getting Authorized to Search and Seize
Suiting Up for a Lawsuit or Criminal Investigation 23 Chapter 3 Getting Authorized to Search and Seize 39 Chapter 4 Documenting and Managing t...
Minding and Finding the Loopholes
Preparing to Crack the Case
Investigating XFiles eXotic Forensics
Succeeding in Court
Winning a Case Before You Go to Court
Winning a Case Before You Go to Court 287 Chapter 17 Standing Your Ground in Court
The Part of Tens
The Part of Tens
Acquiring and Authenticating EEvidence
Minding and Finding the Loopholes 73 Chapter 6 Acquiring and Authenticating EEvidence 95 Chapter 7 Examining EEvidence
Extracting Hidden Data
Doing Computer Forensic Investigations
EMail and Web Forensics 153 Chapter 10 Data Forensics