You must be logged in to post a review.
Academic book request
Inspection copies are available to lecturers and course leaders considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with your details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
In-line with our Environmental Policy and to avoid unnecessary wastage, we provide digital access for inspection copy purposes. Print copies can be provided if books are adopted as course reading.
Please note that all requests are subject to our approval. Further details regarding our inspection copy service may be found HERE.
Digital Forensics, Investigation and Response
Author: Chuck EasttomOVERVIEW
This product is available with Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills.
Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources.
Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device.
Features and Benefits
- Available with new Cybersecurity Cloud Labs
- Chapter 8 Windows Forensics, has been expanded to include SRUM, BAM, and DAM registry entries
- Updates to all chapters include changes to the underlying technology, changes to the law, and newer case studies
- New chapter regarding memory forensics
- Chapter 15 “New Trends” introduces a general methodology of smart TV forensics
TABLE OF CONTENTS
- Part One Introduction to Forensics
- Chapter 1 Introduction to Forensics
- Chapter 2 Overview of Computer Crime
- Chapter 3 Forensic Methods and Labs
- Part Two Forensics Tools, Techniques, and Methods
- Chapter 4 Collecting, Seizing, and Protecting Evidence
- Chapter 5 Understanding Techniques for Hiding and Scrambling Information
- Chapter 6 Recovering Data
- Chapter 7 Incident and Intrusion Response
- Part Three Branches of Digital Forensics
- Chapter 8 Windows Forensics
- Chapter 9 Linux Forensics
- Chapter 10 Macintosh Forensics
- Chapter 11 Email Forensics
- Chapter 12 Mobile Forensics
- Chapter 13 Network Forensics
- Chapter 14 Memory Forensic
- Chapter 15 Trends, Future Directions, and Resources
Related Products
Our Reviews
Blog
Last Month's Bestseller
Clinical ECGs in Paramedic Practice
‘This excellent book will be of interest and indeed of much value to anyone wanting to understand ECG interpretation. It is one that I can definitely recommend.’ Douglas Chamberlain, CBE...
ViewBecome a Class VIP!
Sign up to hear about new products, promotions and more! Plus, enjoy a 25% discount and free P&P each month!
Reviews
There are no reviews yet.