Computer forensics investigating data and image files

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecti...

Full description

Saved in:
Bibliographic Details
Corporate Author: EC-Council Press
Format: Book
Language:English
Published: Boston, MA Cengage Learning 2017
Edition:Second edition
Series:Computer forensics book 3
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 92807
003 MY-KLNDU
005 20241220003630.0
008 220726s20172017maua 001 0 eng d
020 |a 978-1305883499 (pbk) 
020 |a 1305883497 (pbk) 
039 9 |a 202211141235  |b rafizah  |c 202211141227  |d rafizah  |y 202207260937  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a HV 8079.C65  |b C664 2017 
090 |a HV 8079.C65  |b C664 2017 
245 0 0 |a Computer forensics  |b investigating data and image files  |c EC-Council Press 
246 3 0 |a Investigating data and image files 
250 |a Second edition 
264 1 |a Boston, MA  |b Cengage Learning  |c 2017 
264 4 |c © 2017 
300 |a xix, 151 pages  |b color illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a Computer forensics  |v book 3 
500 |a Includes index 
500 |a "Book 3 of 4 C-HFI (Computer Hacking Forensic Investigator) certification." 
520 |a The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other three books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. Investigating Data and Image Files provides a basic understanding of steganography, data acquisition and duplication, encase, how to recover deleted files and partitions and image file forensics. 
592 |a IN/016411  |b 14/9/2022  |c RM 410.35  |h Innowawasan 
650 0 |a Computer crimes  |x Investigation  |x Examinations  |v Study guides 
650 0 |a Criminal investigation  |x Examinations  |v Study guides 
650 0 |a Computer security  |x Examinations  |v Study guides 
650 0 |a Hackers 
650 0 |a Electronic evidence 
710 2 |a EC-Council Press 
830 0 |a Computer forensics  |v book 3 
999 |a vtls000103683  |c 92807  |d 92807