- Series: Jones & Bartlett Learning Information Systems Security & Ass
- Paperback: 318 pages
- Publisher: Jones & Bartlett Learning; 2 edition (August 30, 2013)
- Language: English
- ISBN-10: 1284031055
- ISBN-13: 978-1284031058
- Product Dimensions: 9 x 7.3 x 0.8 inches
- Shipping Weight: 1.2 pounds (View shipping rates and policies)
- Average Customer Review: 3.4 out of 5 stars See all reviews (13 customer reviews)
- Amazon Best Sellers Rank: #358,189 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
System Forensics, Investigation And Response (Jones & Bartlett Learning Information Systems Security & Ass) 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Prepare for your professional certification with study guides and exam prep tools from Wiley. See more
Frequently bought together
Customers who bought this item also bought
About the Author
Chuck Easttom is a computer scientist and author of over 20 books. He is an inventor with 8 patented inventions. He travels all over the world conducting training, speaking at conferences, and consulting.
Browse award-winning titles. See more
If you are a seller for this product, would you like to suggest updates through seller support?
Top Customer Reviews
Most impressive is Easttom's ability to pack so much detailed information and advice into three hundred pages. He covers all the terminology, as well as the techniques used by hackers and criminals to conceal data, and the techniques used by forensics professionals to recover it. He discusses proper procedures for collecting evidence and preserving it for use in official investigations. He also provides links and brief tutorials on software tools for recovering data from Windows/Linux/Mac computers, as well as mobile devices.
This book can easily be applicable to general students and enthusiasts of computer science (not just the "forensics" field), since it covers such a considerable breadth of information. Professionals in all subspecialties of computing would do well to become familiar with modern forensics techniques, and this book is an excellent starting point.