''Provides the right mix of practical how-to
knowledge in a straightforward, informative fashion that
ties it all the complex pieces together with real-world
case studies...Delivers the most valuable insight on the
market. The authors cut to the chase of what people must
understand to effectively perform computer forensic
investigations.'' (Brian H. Karney, COO, Access Data
Corporation). This title includes latest strategies for
investigating cyber-crime. Identify and investigate
computer criminals of all stripes with help from this
fully updated real-world resource. ''Hacking Exposed
Computer Forensics, Second Edition'' explains how to
construct a high-tech forensic lab, collect prosecutable
evidence, discover e-mail and system file clues, track
wireless activity, and recover obscured documents. It
helps you learn how to re-create an attacker's
footsteps, communicate with counsel, prepare court-ready
reports, and work through legal and organizational
challenges. It includes case studies straight from
today's headlines cover IP theft, mortgage fraud,
employee misconduct, securities fraud, embezzlement,
organized crime, and consumer fraud cases.It helps you
effectively uncover, capture, and prepare evidence for
investigation; store and process collected data in a
highly secure digital forensic lab Restore deleted
documents, partitions, user activities, and file
systems; analyze evidence gathered from Windows, Linux,
and Macintosh systems; use the latest Web and
client-based e-mail tools to extract relevant artifacts;
overcome the hacker's anti-forensic, encryption, and
obscurity techniques; unlock clues stored in cell
phones, PDAs, and Windows Mobile devices; and, prepare
legal documents that will hold up to judicial and
defense scrutiny. |
|