CITATION

Cowen, David. Computer Forensics InfoSec Pro Guide. US: McGraw-Hill Osborne Media, 2013.

Computer Forensics InfoSec Pro Guide

Authors:

Published:  March 2013

eISBN: 9780071742467 0071742468 | ISBN: 9780071742450

Book description:

Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.

You’ll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource.

Computer Forensics: InfoSec Pro Guide features:

  • Lingo—Common security terms defined so that you’re in the know on the job

  • IMHO—Frank and relevant opinions based on the author’s years of industry experience

  • Budget Note—Tips for getting security technologies and processes into your organization’s budget

  • In Actual Practice—Exceptions to the rules of security explained in real-world contexts

  • Your Plan—Customizable checklists you can use on the job now

  • Into Action—Tips on how, why, and when to apply new skills and techniques at work

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics.

Keywords: COMPUTER, FORENSICS, DAVID COWEN, BEGINNER, GUIDE, DATA, STORED, LEGAL, SIDE, SETTING, BUILDING, LAB, ASSEMBLING, TOOLKIT, PREPARING, EVIDENCE, WORKING, SEARCHING, METADATA, INTERNET, ANALYSIS, EMAIL, WINDOWS, REGISTRY, FINDING, UNALLOCATED, SPACE, CARVING, FOUND, STORY, TELL, VERIFYING, FACTS, CREATING, TIMELINE, PRODUCING, FORMS, CHECKLISTS, TOOLS, CAREERS, INFORMATIONAL, WEBSITES, GLOSSARY, HACKING EXPOSED, HIGH-PROFILE, IDENTIFICATION, PONZI, SCHEME, DELETION, SCANDALS, ENRON, BANKS, WORLD, ESSENTIAL, SKILLS, REQUIRED, GATHER, DETERMINE, CORRECT, VALID, PRESENT, PROCESSES, TESTED, PROVEN, TAMPERED, PITFALLS, ISSUES, AWARE, ELECTRONIC, BASICS, OPEN SOURCE, INTERACTIVE, CASE STUDIES, CONCEPTS, MISTAKES, COMMON, AVOID, EXPERTS, INTERNATIONALLY, RECOGNIZED, CONFERENCES, GLOBAL, NETWORK, ADMINISTRATOR, SECURITY, BREACH, ATTACK, RESPONDING, IDC, MARKET, FRAMEWORK, PERFORM, TECHNIQUES, TRACING, IP, THEFT, CREATION, CORRELATION, MULTI-PARTY, FRAUD, RECONSTRUCTION, DELIBERATE, DESTRUCTION, METHODOLOGY, NULLIFY, TRADITIONAL, GOVERNMENT, INVESTIGATORY, AGENCIES, TECHNOLOGY, DISCOVERY, EXPERTISE, STRATEGIC, ADVICE, WITNESS, EXPERT, E-DISCOVERY, , HACKING EXPOSED, HACKING EXPOSED WEB 2.0, HACKING EXPOSED VOIP, HACKING EXPOSED WINDOWS, HACKING EXPOSED WEB APPLICATIONS, HACKING EXPOSED CISCO NETWORKS, GRAY HAT HACKING, HACKING EXPOSED WIRELESS, HACKING EXPOSED COMPUTER FORENSICS, 19 DEADLY SINS OF SOFTWARE SECURITY, 24 DEADLY SINS OF SOFTWARE SECURITY, CCNA CISCO CERTIFIED NETWORK ASSOCIATE STUDY GUIDE, CCENT CISCO CERTIFIED ENTRY NETWORKING TECHNICIAN STUDY GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE WIRELESS STUDY GUIDE, CISSP ALL-IN-ONE EXAM GUIDE, MOBILE APPLICATION SECURITY, HACKING EXPOSED MALWARE AND ROOTKITS, HACKING EXPOSED COMPUTER FORENSICS, HACKING EXPOSED VIRTUALIZATION & CLOUD COMPUTING, IT SECURITY METRICS, SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) IMPLEMENTATION, IT AUDITING, CISSP BOXED SET, CISA CERTIFIED INFORMATION SYSTEMS AUDITOR ALL-IN-ONE EXAM GUIDE, MIKE MEYERS' COMPTIA SECURITY+ CERTIFICATION PASSPORT, SECURITY+ ALL-IN-ONE EXAM GUIDE, COMPTIA A+ CERTIFICATION ALL-IN-ONE EXAM GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE SECURITY STUDY GUIDE, CWSP CERTIFIED WIRELESS SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE, CWNA CERTIFIED WIRELESS NETWORK ADMINISTRATOR & CWSP CERTIFIED WIRELESS SECURITY PROFESSIONAL ALL-IN-ONE EXAM GUIDE, CTS CERTIFIED TECHNOLOGY SPECIALIST EXAM GUIDE, PRINCIPLES OF COMPUTER SECURITY COMPTIA SECURITY+ AND BEYOND LAB MANUAL, PRINCIPLES OF COMPUTER SECURITY, COMPTIA SECURITY+ AND BEYOND, COMPTIA A+ CERTIFICATION BOXED SET, COMPTIA SECURITY+ CERTIFICATION STUDY GUIDE, COMPTIA SECURITY+ CERTIFICATION PRACTICE EXAMS, COMPTIA SECURITY+ ALL-IN-ONE EXAM GUIDE, COMPTIA SECURITY+ CERTIFICATION BOXED SET, SECURITY METRICS A BEGINNER'S GUIDE, WIRELESS NETWORK SECURITY A BEGINNER'S GUIDE, COMPUTER FORENSICS A BEGINNER'S GUIDE, SECURING THE CLICKS, NETWORK SECURITY IN THE AGE OF SOCIAL MEDIA, CEH CERTIFIED ETHICAL HACKER ALL-IN-ONE EXAM GUIDE