Computer Forensics: Investigation Procedures and Response (ECCouncil Press)

Computer Forensics: Investigation Procedures and Response (ECCouncil Press)

In Stock
SKU: SONG1435483499
UPC: 9781435483491
Brand: Brand: Cengage Learning
Regular price$9.48
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

The Computer Forensic Series by ECCouncil provides the knowledge and skills to identify, track, and prosecute the cybercriminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker s path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder s footprint and gather all necessary information and evidence to support prosecution in a court of law. The first book in the Computer Forensics series is Investigation Procedures and Response. Coverage includes a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: What is the page count of this book? A: This book has one hundred seventy-six pages. It provides a comprehensive overview of computer forensics and investigation procedures.
  • Q: What type of binding does this book have? A: This book is paperback bound. This makes it flexible and lightweight, ideal for easy handling and reading.
  • Q: What are the dimensions of this book? A: The book measures eight point seventy-five inches in length, zero point fifty-one inches in width, and eleven point five inches in height. These dimensions make it a standard-sized book for easy storage.
  • Q: Who is the author of this book? A: The book is authored by EC-Council. They are known for their expertise in cybersecurity and computer forensic education.
  • Q: What topics are covered in the book? A: The book covers computer forensics, investigation procedures, and response strategies. It is designed to educate readers on how to handle cyber-crime investigations.
  • Q: Is this book suitable for beginners? A: Yes, this book is suitable for beginners. It provides foundational knowledge of computer forensics and is ideal for those new to the field.
  • Q: Can this book help in legal cases? A: Yes, this book provides techniques to generate potential legal evidence. It is aimed at preparing individuals for prosecuting cyber-crime.
  • Q: What kind of reader would benefit from this book? A: Students and professionals in cybersecurity will benefit from this book. It offers insights into forensic investigations and tracking cyber-criminals.
  • Q: Is this book useful for professionals in network security? A: Yes, this book is very useful for network security professionals. It helps them understand forensic procedures crucial for their work.
  • Q: How should I handle this book to maintain its condition? A: To maintain its condition, store it in a cool, dry place and avoid exposing it to direct sunlight. This will prevent fading and damage.
  • Q: What is the condition of this used book? A: This book is listed as 'Used Book in Good Condition.' It should have minimal wear and be fully readable.
  • Q: How can I best utilize the techniques from this book? A: Utilize the techniques by practicing in a secure lab environment. The book includes labs that complement the theoretical knowledge provided.
  • Q: What should I do if the book arrives damaged? A: If the book arrives damaged, contact the seller for a return or exchange. Most sellers have policies in place for such issues.
  • Q: Is this book appropriate for academic study? A: Yes, this book is appropriate for academic study. It serves as a textbook for courses related to computer forensics and cybersecurity.
  • Q: Will this book help me track cyber intruders? A: Yes, this book provides strategies for tracking cyber intruders. It teaches readers how to analyze and gather evidence effectively.

Recently Viewed