|
![]() |
|||
|
||||
OverviewPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Conduct repeatable, defensible investigations withEnCase Forensic v7Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation withEnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide. Install EnCase Forensic v7 and customize the user interface Prepare your investigation and set up a new case Collect and verify evidence from suspect computers and networks Use the EnCase Evidence Processor and Case Analyzer Uncover clues using keyword searches and filter results through GREP Work with bookmarks, timelines, hash sets, and libraries Handle case closure, final disposition, and evidence destruction Carry out field investigations using EnCase Portable Learn to program in EnCase EnScript Full Product DetailsAuthor: Suzanne WidupPublisher: McGraw-Hill Education - Europe Imprint: Osborne/McGraw-Hill Dimensions: Width: 18.80cm , Height: 2.30cm , Length: 22.90cm Weight: 0.766kg ISBN: 9780071807913ISBN 10: 0071807918 Pages: 448 Publication Date: 16 June 2013 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsPart 1: Preparing for the Forensics Function 1. The Road to Readiness 2. Getting started 3. Basic Concepts Part 2: Beginning with EnCase Forensic 4. Your First case 5.Working in the Evidence Browser 6. Diving into the View Pane Part 3: Looking for Evidence 7. Searching for Clues 8. Further Inspection 9. Digital Dumpster Diving Part 4: Putting it All Together 10. Determining What Happened 11. Refining the Results 12. An EnScript Primer Part 5: Completed Investigations 13. Reporting 14. Closing the Case Appendix A: Rosetta Stone for Windows Operating Systems Appendix B: EnCase Keyboard Short Cuts Appendix C: EnScript Classes Hierarchy Appendix D: Resources for Further InformationReviewsAuthor InformationSuzanne Widup, ACE, CISSP, GSEC, GCFA: GIAC, is the Founder of the Digital Forensics Association and an information security consultant. She has deep experience in security engineering and analysis in roles at Safeway and PG&E as well as in Unix system administration in roles at Verizon Wireless, Clorox, and PeopleSoft. Widup’s articles have been published in NetworkWorld and she is a regular speaker at SecureWorld Expo. Tab Content 6Author Website:Countries AvailableAll regions |