Synopses & Reviews
Essential reading for launching a career in computer forensics
Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.
- Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crime
- Details the ways to conduct a computer forensics investigation
- Highlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witness
- Walks you through identifying, collecting, and preserving computer evidence
- Explains how to understand encryption and examine encryption files
Computer Forensics JumpStart is the resource you need to launch a career in computer forensics.
Due to the continuing rise of criminal conduct with technology, computer forensics is a rapidly growing discipline and one of the fastest growing segments of IT. If you are considering a career in this hot field, "Computer Forensics JumpStart" is for you. The second edition of an in-depth introduction to computer forensics, this major update covers the latest tools and practices as well as available certifications that can help you to launch a new career. Written by a team computer forensics experts, coverage includes: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data Capturing images Identifying, collecting, and preserving computer evidence Understanding encryption and examining encrypted files Documenting your case Evaluating common computer forensic tools Presenting computer evidence in court as an expert witness
Launch Your Computer Forensics Career—Quickly and Effectively
Written by a team of computer forensic experts, the new edition of this popular guide has been extensively updated to cover the latest tools, practices, and core information you need to launch a career in this rapidly growing field. Inside, you'll learn:
What skills you need to become an effective investigator
Things to consider before you start investigating a scene
How to identify, collect, and preserve computer evidence
The trick to finding hidden data and extracting information from it
Common forensic tools and the latest on passwords and encryption
How to present computer evidence in court as an expert witness
Which professional certifications are available and what you need to do
In-Depth Coverage for Anyone Considering a Career in Computer Forensics
A Valuable Reference and Resource for Those Already in the Industry
Practical Information on Professional Certifications in Computer Forensics
About the Author
Michael G. Solomon
, CISM, CISSP, PMP, GSEC, is a full-time security speaker, consultant, trainer, and project manager who specializes in development and assessment security topics. An IT professional since 1987, he has worked on projects or done training for more than 60 major companies and organizations, including EarthLink, Schumacher, Nike, and others.
K Rudolph, CISSP, is founder and President of Native Intelligence, which provides security training for federal agencies and commercial firms. She is a featured speaker at national conferences and a board member of Federal Information Systems Security Educators' Association.
Ed Tittel is a 28-year computer industry veteran with over 130 books to his credit. He writes regularly for sites such as InformIT.com and TechTarget.
Neil Broom, CCE, CISSP, CFE, is President and Laboratory Director of Technical Resource Center, Inc. in Atlanta, Georgia. He has more than 15 years of experience providing investigative, technical, educational, and security services.
Diane Barrett is a forensic trainer for Paraben. Holding many industry certifications including CISSP, ISSMP, and DCFP, she has been involved in the IT industry for almost 20 years and has been active in education, security, and forensics for the past 10 years.
Table of Contents
Chapter 1 The Need for Computer Forensics.
Chapter 2 Preparation—What to Do Before You Start.
Chapter 3 Computer Evidence.
Chapter 4 Common Tasks.
Chapter 5 Capturing the Data Image.
Chapter 6 Extracting Information from Data.
Chapter 7 Passwords and Encryption.
Chapter 8 Common Forensic Tools.
Chapter 9 Pulling It All Together.
Chapter 10 How to Testify in Court.
Appendix A Answers to Review Questions.
Appendix B Forensic Resources.
Appendix C Forensic Certifications and More.
Appendix D Forensic Tools 289