- Tapa blanda: 720 páginas
- Editor: Course Technology Inc; Edición: 4th edition (28 de septiembre de 2009)
- Idioma: Inglés
- ISBN-10: 1435498836
- ISBN-13: 978-1435498839
- Valoración media de los clientes: Sé el primero en opinar sobre este producto
- Clasificación en los más vendidos de Amazon: nº1.320.068 en Libros en idiomas extranjeros (Ver el Top 100 en Libros en idiomas extranjeros)
- Ver el Índice completo
Compara Precios en Amazon
+ Envío GRATIS
Guide to Computer Forensics and Investigations (Inglés) Tapa blanda – 28 sep 2009
|Nuevo desde||Usado desde|
Hay una nueva edición de este producto:
Descripción del producto
1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. 10: Recovering Graphics Files. 11: Virtual Machines, Network Forensics, and Live Acquisitions. 12: E-mail Investigations. 13: Cell Phone and Mobile Device Forensics. 14: Report Writing for High-Tech Investigations. 15: Expert Testimony in High-Tech Investigations. 16: Ethics and High-Tech Investigations. Appendix A: Certification and Testing Processes for Computer Forensics. Appendix B: ComputerForensics References. Appendix C: Computer Forensics Lab Configuration. Appendix D: DOS-Based Computer Forensics Tools.
Reseña del editor
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. It is appropriate for students new to the field, or as a refresher and technology update for professionals in law enforcement, investigations, or computer security. The book features free downloads of the latest forensic software, so readers can become familiar with the tools of the trade.Ver Descripción del producto
No es necesario ningún dispositivo Kindle. Descárgate una de las apps de Kindle gratuitas para comenzar a leer libros Kindle en tu smartphone, tablet u ordenador.
Obtén la app gratuita:
Detalles del producto
Si eres el vendedor de este producto, ¿te gustaría sugerir ciertos cambios a través del servicio de atención al vendedor?
Opiniones de clientes
|5 estrellas (0%)|
|4 estrellas (0%)|
|3 estrellas (0%)|
|2 estrellas (0%)|
|1 estrella (0%)|
Opiniones de clientes más útiles en Amazon.com
You CAN get the DVD content still, it just does not come with the Ebook. Visit the student dashboard on cengage's website, signup, and search for free tools using the ISBN to get a link. It is IMPORTANT to download these files ASAP since the access to the files expires after a couple weeks. I was pretty annoyed as well when I realized that the DVD content was not included, after doing some searching I found how to get it. Don't be discouraged, if you want the Ebook, grab it in confidence!
4 stars since it is not the clearest regarding the DVD material with zero help on how to get it. *I will update the review after my class to reflect the actual content in it.*
Hope this helps!
Background for this review: I am taking a class in this subject because I already have an AAS in Criminal Justice and hopefully this will bridge with my soon-to-be-completed AAS in CISY, as I'd like to work for law enforcement. As this class is being taught by a graduate of my school who works for a branch of the DOJ, I'm fairly confident in the information at this time. Also I haven't really noticed mistakes in the legal information, although of course anyone referring to the book must be aware that their state or country may have different laws or procedures. The book actually says that repeatedly to make the point stick.
The book itself is fairly well written, in my opinion. I have trouble with some textbooks due to a learning disability and when the writing isn't plain it does not go well. This book is very readable to me. I will agree with some other reviewers that there is some repetition on some subjects, but it isn't too bad and in a way I think it can help prevent confusion. The specificity of including terms and what file system (for example) another area refers to should do well to keep the reader from making crucial mistakes if they are actually performing one of the tasks. This is especially important if the reader is working on a real case.
One minor complaint I have is that some of the chapters are very long, and perhaps they could have been split in half or something. My class is doing one chapter a week which doesn't sound bad until you realize how long chapter six is, for example. But again this is just a minor complaint and it's only because I'm taking other classes as well so I am busy.
Our class is online, so we are not using the CD, but others have said that a used copy of this book will have disabled the access, so bear that in mind and ask the seller before buying used. I have done some parts of some of the exercises, as I had to use VM Ware and various operating systems in other classes and there was overlap, but mostly we're doing the questions out of the book and discussion so our class is more theoretical. That being said, I can't easily verify how updated or accurate they are (although the book does not mention Windows 7 or 8, so keep that in mind). They do seem to be well laid out though.
From what I learned in my CJ classes, the non-computer info (aka investigations, evidence handling, etc) is pretty accurate and even though not super in-depth, should at least provide a jumping off point to learn more on your own.
So in closing, the fourth edition seems to be much improved from the old ones and I think this book is worth checking out if you have an interest in computer forensics and can justify the purchase.