Hacking Exposed Computer Forensics, Second Edition https://www.mheducation.com/cover-images/Jpeg_250-high/0071626778.jpeg?404URL=https://shop.mheducation.com/mhshopweb/images/no_cover_140.png
Table of Contents

Interested in seeing the entire table of contents?

Program Details

Part 1: Preparing for an Incident; Ch. 1: The Forensics Process; Ch. 2: Computer Fundamentals; Ch. 3: Forensics Lab Environment Preparation; Part 2: Collecting the Evidence; Ch. 4: Forensically Sound Evidence Collection; Ch. 5: Remote Investigations and Collections; Part 3: Forensic Investigation Techniques; Ch. 6: Microsoft Windows Systems Analysis; Ch. 7: Linux Analysis; Ch. 8: Macintosh Analysis; Ch. 9: Defeating Anti-Forensic Techniques; Ch. 10: Enterprise Storage Analysis; Ch. 11: Email Analysis; Ch. 12: Tracking User Activity; Ch. 13: Forensic Analysis of Mobile Devices; Part 4: Presenting your Findings; Ch. 14: Documenting the Investigation; Ch. 15: The Justice System; Part 5: Putting It All Together; Ch. 16: IP Theft; Ch. 17: Employee Misconduct; Ch. 18: Employee Fraud; Ch. 19: Corporate Fraud; Ch. 20. Organized Cyber Crime; Ch. 21. Consumer Fraud; Appendix A. Searching Techniques; Index