Hacking Exposed Computer Forensics, Second Edition and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $55.00
  • Save: $44.77 (81%)
Rented from RentU
To Rent, select Shipping State from options above
Due Date: Dec 18, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
FREE Shipping on orders over $35.
Condition: Used: Good
Comment: Used Good condition book may have signs of cover wear and/or marks on corners and page edges. Inside pages may have highlighting, writing and underlining.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Qty:1
  • List Price: $55.00
  • Save: $22.29 (41%)
FREE Shipping on orders over $35.
Only 7 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $2.64
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions Paperback – September 10, 2009

ISBN-13: 978-0071626774 ISBN-10: 0071626778 Edition: 2nd

Buy New
Price: $32.71
Rent
Price: $10.23
35 New from $19.61 27 Used from $8.80
Amazon Price New from Used from
eTextbook
"Please retry"
Paperback
"Please retry"
$32.71
$19.61 $8.80

There is a newer edition of this item:

Hacking Exposed Computer Forensics, Third Edition
Sign up to be notified when this item becomes available.

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions + Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions)
Price for both: $64.20

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Hacking Exposed
  • Paperback: 544 pages
  • Publisher: McGraw-Hill Osborne Media; 2 edition (September 10, 2009)
  • Language: English
  • ISBN-10: 0071626778
  • ISBN-13: 978-0071626774
  • Product Dimensions: 9.2 x 7.3 x 1.1 inches
  • Shipping Weight: 2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #409,324 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Aaron Philipp is a managing consultant in the Disputes and Investigations practice at Navigant Consulting, which assists domestic and global corporations and their counsel who face complex and risky legal challenges.

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies nationwide.

Chris Davis, CISA, CISSP, is an information security and computer forensics author, trainer, and presenter.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.3 out of 5 stars
5 star
2
4 star
4
3 star
0
2 star
0
1 star
0
See all 6 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

16 of 17 people found the following review helpful By Amazon Customer on March 30, 2010
Format: Paperback
I use this text as the required text for a course I teach on Computer Forensics. Overall, it is an excellent introductory text. Students say that it is easy to read, which is exactly what I want in a textbook. However, I do not use it exclusively for lecture material. I pull my lecture material from a variety of texts, such as Real Digital Forensics, Incident Response (2nd edition), File System Forensic Analysis, and the other Hacking Exposed Textbooks.

The second edition is a welcome improvement. I really like the new section (Part V) where it discusses the practical cases, and what type of forensic techniques that you would use for each type of case.

I create all of my own lectures and labs for the classroom. I assign this text to students to fill in the gaps of the lectures.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 6 people found the following review helpful By K. Hamilton on March 5, 2010
Format: Paperback Verified Purchase
I found this to be a good overview for deciding if I want to pursue this field or not. It goes over enough detail & highlights the process to help determine if I want to take the next step and spend the $$$$'s on the forensic software.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Todd Hawley on March 14, 2012
Format: Paperback
I came across this book when I was reading Hacking Exposed Network Security & Secrets. Since I enjoyed that book, I felt I'd enjoy this one as well. I was not disappointed. It introduces the reader to the world of computer forensics, along with a lot of tips and suggestions about the field, as well as what to watch out for. I feel the authors do an excellent job of discussing the world of forensics. Yes it does feature EnCase examples prominently. It also features screen shots of many other forensics programs like FTK, Paraben and open source ones.

I also liked the authors' occasional humor helpful when trying to explain certain points such as the popularity of cell phones (and using them in a forensics investigation) or how a suspect is almost certain to repeat the same bad behavior over and over when given the chance. Since this is an introductory level book, it touches on a lot of subjects but only at a general level. This is not an issue, there are numerous volumes of forensic books available that address specific topics in much greater detail that this book may not. I plan on reading them next.

I would definitely recommend this book to anyone interested in learning more about computer forensics.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search