Skip to content

Hacking Exposed Computer Forensics, Second Edition Computer Forensics Secrets & Solutions

Best in textbook rentals since 2012!

ISBN-10: 0071626778

ISBN-13: 9780071626774

Edition: 2nd 2010

Authors: Aaron Philipp, David Cowen, Chris Davis

List price: $91.95
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $91.95
Edition: 2nd
Copyright year: 2010
Publisher: McGraw-Hill Education
Publication date: 10/1/2009
Binding: Paperback
Pages: 544
Size: 7.40" wide x 9.20" long x 1.10" tall
Weight: 2.178

Author Profiles Aaron Philippis a Managing Consultant in the D&I practice at Navigant Consulting. In this capacity, he provides consulting services in the fields of Computer Forensics and High-Tech Investigations. He specializes in complex computer forensic techniques such as identification and tracing of IP theft, timeline creation and correlation relating to multi-party fraud and reconstruction of evidence after deliberate data destruction has occurred that would nullify traditional computer forensic methodology. Mr. Philipp was previously the Managing Partner of Affect Computer Forensics, a boutique forensics firm based in Austin, TX with offices in Dallas, TX and Hong Kong. Affect…    

David Cowen, CISSP, is coauthor of the previous bestselling editions of Hacking Exposed Computer Forensics and Anti-Hacker Toolkit, Third Edition. He is a Partner at G-C Partners, LLC where he provides expert witness services and consulting to Fortune 500 companies nationwide.Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.

Preparing for an Incident
The Forensics Process
Computer Fundamentals
Forensics Lab Environment Preparation
Collecting the Evidence
Forensically Sound Evidence Collection
Remote Investigations and Collections
Forensic Investigation Techniques
Microsoft Windows Systems Analysis
Linux Analysis
Macintosh Analysis
Defeating Anti-Forensic Techniques
Enterprise Storage Analysis
Email Analysis
Tracking User Activity
Forensic Analysis of Mobile Devices
Presenting your Findings
Documenting the Investigation
The Justice System
Putting It All Together
IP Theft
Employee Misconduct
Employee Fraud
Corporate Fraud
Organized Cyber Crime
Consumer Fraud
Searching Techniques
Index