PART OF THE NEW JONES amp BARTLETT LEARNING INFORMATION SYSTEMS SECURITY amp ASSURANCE SERIESCompletely revised and rewritten to keep pace with the fast-paced field of Computer Forensics!Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response, Second Edition begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field.New and Key Features of the Second Edition: Examines the fundamentals of system forensics Discusses computer crimes and forensic methods Written in an accessible and engaging style Incorporates real-world examples and engaging casesInstructor Materials for System Forensics, Investigation, and Response include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts Instructor's Manual
Auflage
Sprache
Verlagsort
Zielgruppe
Editions-Typ
Gewicht
ISBN-13
978-1-284-03105-8 (9781284031058)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Dr. Chuck Easttom is the author of 32' books, including several on computer security, forensics, and cryptography.' He has also authored scientific papers on digital forensics, cyber warfare, machine learning, cryptography, and applied mathematics. He is an inventor with 22 computer science patents.'He holds a Doctor of Science (D.Sc.) in cyber security, a Ph.D. in nanotechnology, a Ph.D. in computer science,'and three master's degrees (one in applied computer science, one in education,'and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE.He also holds 55 industry certifications including many cyber security and digital forensics certifications. He has both academic and hands on forensics experience. He has served as an expert witness in U.S. court cases since 2004.' He is currently an adjunct lecturer for Georgetown University where he teaches cyber security, systems engineer, and cryptography and an adjunct professor for University of Dallas where he teaches a graduate course in digital forensics.'