جزییات کتاب
Content: Technical Editor, Page iiiContributors, Pages iii-viChapter 1 - Computer Forensics in Today's World, Pages 1-60Chapter 2 - Systems, Disks, and Media, Pages 61-131Chapter 3 - The Computer Investigation Process, Pages 133-195Chapter 4 - Acquiring Data, Duplicating Data, and Recovering Deleted Files, Pages 197-263Chapter 5 - Windows, Linux, and Macintosh Boot Processes, Pages 265-285Chapter 6 - Windows and Linux Forensics, Pages 287-349Chapter 7 - Steganography and Application Password Crackers, Pages 351-386Chapter 8 - Computer-Assisted Attacks and Crimes, Pages 387-439Chapter 9 - Investigating Network Traffic and Investigating Logs, Pages 441-467Chapter 10 - Router Forensics and Network Forensics, Pages 469-485Chapter 11 - Investigating Wireless Attacks, Pages 487-509Chapter 12 - PDA, Blackberry, and iPod Forensics, Pages 511-542Chapter 13 - Forensic Software and Hardware, Pages 543-616Chapter 14 - Forensics Investigation Using EnCase, Pages 617-673Chapter 15 - Incident Response, Pages 675-705Chapter 16 - Types of Investigations, Pages 707-811Appendix A - Becoming an Expert Witness, Pages 813-860Appendix B - Worldwide Forensic Acts and Laws, Pages 861-920Index, Pages 921-939