text.skipToContent text.skipToNavigation
  1. Home
  2. Computer Science & IT
  3. Certification
  4. Apple Certification
  5. Practical Guide to Computer Forensics Investigations, A

Practical Guide to Computer Forensics Investigations, A, 1st edition

  • Darren R. Hayes

Published by Pearson IT Certification (December 17th 2014) - Copyright © 2015

1st edition

Chosen format
View all
Practical Guide to Computer Forensics Investigations, A

ISBN-13: 9780789741158

Includes: Paperback
Free delivery
$65.00

What's included

  • Paperback

    You'll get a bound printed text.

Overview

  • Practical information from the author's personal experience working with law enforcement
  • Delves into the not-widely-understood areas of Mac forensics and mobile forensics
  • Includes hands-on activities, uncommon for most computer forensics books

Table of contents

Introduction xx

Chapter 1: The Scope of Computer Forensics 2

    Introduction.. . . . . . . . . . . . . . 2

        Popular Myths about Computer Forensics.. . . . . . . 3

    Types of Computer Forensics Evidence Recovered.. . . . . . 5

        Electronic Mail (Email).. . . . . . . . . . . 5

        Images.. . . . . . . . . . . . . . 7

        Video. . . . . . . . . . . . . . 8

        Websites Visited and Internet Searches.. . . . . . . 9

        Cellphone Forensics.. . . . . . . . . . . 10

    What Skills Must a Computer Forensics Investigator Possess?.. . . 10

        Computer Science Knowledge. . . . . . . . . 10

        Legal Expertise.. . . . . . . . . . . . 11

        Communication Skills.. . . . . . . . . . . 11

        Linguistic Abilities.. . . . . . . . . . . 11

        Continuous Learning.. . . . . . . . . . . 11

        An Appreciation for Confidentiality. . . . . . . . 12

    The Importance of Computer Forensics.. . . . . . . . 12

        Job Opportunities.. . . . . . . . . . . 12

    A History of Computer Forensics.. . . . . . . . . 14

        1980s: The Advent of the Personal Computer.. . . . . . 14

        1990s: The Impact of the Internet.. . . . . . . . 15

    Training and Education. . . . . . . . . . . . 19

        Law Enforcement Training.. . . . . . . . . . 19

    Summary.. . . . . . . . . . . . . . 25

Chapter 2: Windows Operating and File Systems 32

    Introduction.. . . . . . . . . . . . . . 32

    Physical and Logical Storage.. . . . . . . . . . 34

        File Storage.. . . . . . . . . . . . . 34

    File Conversion and Numbering Formats.. . . . . . . . 37

        Conversion of Binary to Decimal.. . . . . . . . 37

        Hexadecimal Numbering. . . . . . . . . . 37

        Conversion of Hexadecimal to Decimal. . . . . . . 38

        Conversion of Hexadecimal to ASCII (American Standard Code) for Information Interchange.. . . . . . . . . 38

        Unicode.. . . . . . . . . . . . . 42

    Operating Systems.. . . . . . . . . . . . 42

       

For teachers

All the material you need to teach your courses.

Discover teaching material