📖[PDF] Guide to Computer Forensics and Investigations (with DVD) by Bill Nelson | Perlego
Get access to over 750,000 titles
Start your free trial today and explore our endless library.
Join perlego now to get access to over 750,000 books
Join perlego now to get access to over 750,000 books
Join perlego now to get access to over 750,000 books
Join perlego now to get access to over 750,000 books
Guide to Computer Forensics and Investigations (with DVD)
Guide to Computer Forensics and Investigations (with DVD)
Unavailable in your region
📖 Book - PDF

Guide to Computer Forensics and Investigations (with DVD)

Bill Nelson, Amelia Phillips, Christopher Steuart,
shareBook
Share book
language
English
format
PDF
unavailableOnMobile
Only available on web
Unavailable in your region
📖 Book - PDF

Guide to Computer Forensics and Investigations (with DVD)

Bill Nelson, Amelia Phillips, Christopher Steuart,
Book details
Table of contents
Citations

About This Book

Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines sweeping topic coverage, authoritative information from seasoned experts, and roll-up-your-sleeves applications-delivering the most comprehensive forensics resource available. Mirroring the author team's wide ranging areas of expertise, the text focuses on techniques and practices for gathering and analyzing evidence used to solve crimes involving computers. While other books offer overviews of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, introducing you to every step of the computer forensics investigation-from lab set-up to testifying in court. It also details step-by-step guidance on how to use current forensics software and provides free demo downloads of popular tools to use with case studies and hands-on projects-enabling you to put your new skills into action.

Read More

Information

Publisher
Cengage Learning EMEA
Year
2015
ISBN
9781473714922
Topic
Computer Science
Subtopic
Cyber Security

Table of contents