Computer Forensics InfoSec Pro Guide et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus

Identifiez-vous pour activer la commande 1-Click.
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 6,28
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Commencez à lire Computer Forensics InfoSec Pro Guide sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Computer Forensics: InfoSec Pro Guide [Anglais] [Broché]

David Cowen , Aaron Philipp , John Loveland

Prix : EUR 30,82 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 8 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 21,50  
Broché EUR 30,82  
Vendez cet article - Prix de rachat jusqu'à EUR 6,28
Vendez Computer Forensics: InfoSec Pro Guide contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 6,28, que vous pourrez ensuite utiliser sur tout le site Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Description de l'ouvrage

1 décembre 2000 Beginner's Guide

Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.

You’ll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource.

Computer Forensics: InfoSec Pro Guide features:

  • Lingo—Common security terms defined so that you’re in the know on the job
  • IMHO—Frank and relevant opinions based on the author’s years of industry experience
  • Budget Note—Tips for getting security technologies and processes into your organization’s budget
  • In Actual Practice—Exceptions to the rules of security explained in real-world contexts
  • Your Plan—Customizable checklists you can use on the job now
  • Into Action—Tips on how, why, and when to apply new skills and techniques at work

Offres spéciales et liens associés

Descriptions du produit

Biographie de l'auteur

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur (beta) 4.8 étoiles sur 5  10 commentaires
8 internautes sur 8 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 This book delivers! 21 avril 2013
Par shadowboxer - Publié sur
Format:Broché|Achat vérifié
Like the reviewer before me, I became interested in digital forensics after a course in my masters degree program. IMHO, this book lives up to its name. As an infosec pro trying to go the DFIR route, I found this work to have the perfect balance of technical detail, legal discussion, career tips, and real-world applicability. I thoroughly enjoyed this book and am more inspired now than before. My only complaint is that the example images in the Kindle version were terrible. In retrospect, I should've purchased the paperback and will gladly shell out another $25 to get this on my bookshelf. Much respect and thanks to the author!
7 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The best intro to forensics book out there! 8 avril 2013
Par Jeffrey P. Rotenberger - Publié sur
I was fortunate enough to get an advance reviewer copy of David Cowen's new book - Computer Forensics: A Beginner's Guide. After reading it, honestly, I was annoyed and a little bit pissed. I have a Masters in Information Security and it was my Computer Forensics class that got me interested in this field. By comparison the textbook I had for that class was dry, dull, stale and inadequate in its task compared to this book. What I would have given to have this as a reference for that class. Fortunately, now I do!

For those that are unfamiliar with the author; David has co-authored Hacking Exposed: Computer Forensics, writes a popular forensic blog ([...]) and is an experience Computer Forensic Examiner in the state of Texas.

What's to like about this book? To me, the biggest selling point of this book is how it reads. If you like the style of the Hacking Exposed books then you'll enjoy David's writing style as well. It comes mostly as a first person narrative with David's experiences sprinkled liberally throughout the book; and that's a good thing. It becomes very obvious in the reading that not only does the author know what he's talking about, he knows how to communicate it to a wide audience. I finished the entire book in three sittings and I attribute that to how well it is written.
The topics covered flow very well; starting with chapters on getting started, what can be done with computer forensics, how to get training and where to find current information. For the beginner, these chapters are invaluable as they lay the groundwork for the rest of the book as well as providing some great external references for finding more information about forensics. For the experienced forensicator, these chapters are valuable as a way to introduce new people to what you do as well as providing a great reference list of places to keep up-to-date on computer forensics.

From here the book quickly moves into setting up your own lab, what tools (both hardware and software) you'll need, and how to start your first investigation. There's a great chapter here on the importance of testing your tools and how to test them as well as several chapters on different types of forensic cases. The most valuable sections of the book, however, were the final two chapters on the back end of every investigation - documenting and reporting. Why? Because so much of the information in our field focuses on the technical aspects; new tools, new artifacts, new malware, etc., however, all of that is moot if it isn't properly documented and reported. David fortunately doesn't gloss over these topics, instead giving them two skillfully written chapters that will serve experienced and new forensicators well.

Without covering every chapter, I'll instead say that David does an outstanding job of covering a very broad level of topics in computer forensics, including many that you wouldn't expect to be in a book for beginners. And while the focus is on beginners, this book would make an excellent addition to any computer forensicator's library.
That said I did have a few minor quibbles with the book. There were a few minor spelling errors and some grammar issues but I expect all of those will be referenced on the accompanying website ([...]) and fixed in future versions. Another issue I had was that a few chapters' topic introductions did not match up to the chapter summaries. For example, Chapter 8 deals with creating forensic images. The topics listed as being covered do not mention mobile devices, yet it is discussed briefly in the chapter and then listed as a skilled learned in the chapter summary. In reality, the chapter mentions that the topic is rapidly changing and no methods for imaging mobile devices are documented. For a beginner it may be frustrating to see a skill listed as `covered' in the chapter when it was not. This happens a few times in the book but should not seriously detract from what I consider to overall be an outstanding computer forensics book.

In summary, if you have any interest in computer forensics, I highly recommend this book. If you're teaching a course on the topic, please do yourself and your students a favor and use this as your textbook. Your students will thank you!

Notes: My ARC was in .pdf form with no Table of Contents, Introduction or Index so I cannot speak to any issues in those areas of the book. I also cannot speak to any formatting issues that might exist with other e-versions of the book. There were none in my version but they do sometimes occur across different e-formats.
5 internautes sur 5 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Must have guide to starting a computer forensics career, or hobby. 8 mai 2013
Par Ben Starbuck - Publié sur
Format:Broché|Achat vérifié
I am a system admin of 5 years. I am looking to get into computer forensics. I purchased this book a week ago, and have been reading through it daily. This book goes into the subject matter with amazing precision, and the author doesn't hesitate to give you his personal opinions about how things really work, instead of just giving a theoretical best scenario environment.

I would high recommend this book to anyone wanting to get into forensics as a career or hobby. It has continually increased my hunger to learn, and one day, enter the field as a professional.
4 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent resource for anyone in the field of digital forensics! 24 avril 2013
Par Travis P Foley - Publié sur
Format:Broché|Achat vérifié
This book is very well layed out giving new Digital Forensic Examiners a wealth of information all in one easy to read reference. I have only been in the field for a couple of years transitioning from a more traditional Information Security role and have found the information in this book to be the primary catalyst in my own growth and development.

The bottom line is this book allows the new Digital Forensic Examiner to benefit from the Author's years of hard work, knowledge, and experience saving A LOT of time, headaches, and allowing you hit the ground running in the right direction.

This resource is a must have for anyone in DFIR.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Good reference 6 décembre 2013
Par Nancy - Publié sur
Format:Broché|Achat vérifié
This is a good reference guide. I was looking for something more indepth. If you are looking for basic information and not how to make TOR work, you are in good shape. Lots of good information. I purchased it as a reference for my computer forensic classes. Good stuff
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?