• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Computer forensics and digital investigation with Encase Forensic v7 /

پدید آورنده
Suzanne Widup.

موضوع
Computer crimes-- Investigation.,Computer crimes-- Investigation-- Computer programs.,COMPUTERS / Security / General.

رده
HV8079
.
C65
W52
2014

کتابخانه
Central Library and Documents Center of Tehran University

محل استقرار
استان: Tehran ـ شهر: Tehran

Central Library and Documents Center of Tehran University

تماس با کتابخانه : 66466179-61112362-021

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
9780071807913 (paperback)

NATIONAL BIBLIOGRAPHY NUMBER

Number
BL2339

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Computer forensics and digital investigation with Encase Forensic v7 /
First Statement of Responsibility
Suzanne Widup.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
New York
Name of Publisher, Distributor, etc.
: Mc Grow Hill education
Date of Publication, Distribution, etc.
, 2014.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xx, 426 pages :
Other Physical Details
illustrations ;
Dimensions
23 cm

GENERAL NOTES

Text of Note
Includes index.

SUMMARY OR ABSTRACT

Text of Note
"This practical, professional book provides a scenario-based guide to the industry's #1 digital forensics tool, EnCase Forensic Computer Forensics and Digital Investigation with EnCase Forensic shows how to uncover digital evidence in a fast, cost-effective, organized, and repeatable manner using the industry's leading digital investigation software. Part I addresses forensic readiness, setting up the software, and the basic interface. Part II lays out the case study used and how to navigate it step-by-step using the software. Part III details how to find clues and go deeper into investigations (finding hidden and deleted data). Part IV walks you through how to analyze the data, refine, and manipulate the results. Part V discusses the options for automating frequent tasks using EnCase Portable and the EnScript programming language. Sharpens the competitive edge of forensics practitioners through practice with the industry's #1 tool, EnCase Forensic Provides invaluable professional advice on the best working methods of digital forensic specialists An affordable learning option for this widely used tool Walks you through all the latest features to this first major software update in six years--EnCase Forensic v7 performs mobile device forensics (iPad, iPhone, Android, Blackberry, etc.), includes a completely revamped user interface, and streamlined organization of file, data, and report functions Commonly accessible evidence file toolkit allows you to put the book's case examples to the test "--
Text of Note
"Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.- Install EnCase Forensic v7 and customize the user interface - Prepare your investigation and set up a new case - Collect and verify evidence from suspect computers and networks - Use the EnCase Evidence Processor and Case Analyzer - Uncover clues using keyword searches and filter results through GREP - Work with bookmarks, timelines, hash sets, and libraries - Handle case closure, final disposition, and evidence destruction - Carry out field investigations using EnCase Portable - Learn to program in EnCase EnScript

TOPICAL NAME USED AS SUBJECT

Computer crimes-- Investigation.
Computer crimes-- Investigation-- Computer programs.
COMPUTERS / Security / General.

DEWEY DECIMAL CLASSIFICATION

Number
363
.
25/968028553
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
HV8079
.
C65
Book number
W52
2014

PERSONAL NAME - PRIMARY RESPONSIBILITY

Widup, Suzanne.

ORIGINATING SOURCE

Date of Transaction
20151020093627.0
Cataloguing Rules (Descriptive Conventions))
rda

BL
270410

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival