|
![]() |
|||
|
||||
OverviewPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative guidefully addresses cyber forensics techniques, standards, technologies, and legal and ethical principles. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease,this definitive volume also serves as an essential on-the-job reference. COVERS ALL SIX EXAM DOMAINS: Legal and ethical principles Investigations Forensic science Digital forensics Application forensics Hybrid and emerging technologies ELECTRONIC CONTENT INCLUDES: 250 practice exam questions Test engine that provides full-length practice examsand customized quizzes by chapter or by exam domain PDF copy of the book Full Product DetailsAuthor: Chuck EasttomPublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Dimensions: Width: 18.80cm , Height: 2.80cm , Length: 23.90cm Weight: 0.837kg ISBN: 9780071839761ISBN 10: 0071839763 Pages: 544 Publication Date: 16 October 2014 Audience: Professional and scholarly , Professional & Vocational Format: Book Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPart I: Legal and Ethical Principles Chapter 1: Introduction to Forensics Chapter 2: The Investigative Process Chapter 3: Evidence Management Part II: Forensic Science Chapter 4: Principles and Methods Chapter 5: Forensic Analysis Part III: Digital Forensics Chapter 6: Hardware Forensics Chapter 7: Hidden Files and Antiforensics Chapter 8: Network Forensics Chapter 9: Virtual Systems Chapter 10: Mobile Forensics Part IV: Application Forensics and Emerging Technologies Chapter 11: Application Forensics Chapter 12: Malware Forensics Chapter 13: New and Emerging Forensics TechnologyReviewsAuthor InformationChuck Easttom (Plano, TX), CISSP, CEH, CHFI, is President and Chief Consultant for CEC-Security, which specializes in IT training and litigation consulting. Chuck has more than 18 years in the IT industry with 10 years of teaching and professional training experience and 10 years in litigation support/expert witness work. Chuck hold seven provisional computer science patents and has authored 15 books, including System Forensics, Investigation And Response, Second Edition, Computer Security Fundamentals, and Computer Crime, Investigation, and the Law. Tab Content 6Author Website:Countries AvailableAll regions |