1 / 545
文档名称:

McGraw-Hill - Hacking Exposed Computer Forensics 2nd Edition (2009).pdf

格式:pdf   页数:545
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

McGraw-Hill - Hacking Exposed Computer Forensics 2nd Edition (2009).pdf

上传人:kuo08091 2014/2/7 文件大小:0 KB

下载得到文件列表

McGraw-Hill - Hacking Exposed Computer Forensics 2nd Edition (2009).pdf

文档介绍

文档介绍:HACKING EXPOSED™
COMPUTER FORENSICS
SECOND EDITION
REVIEWS
“This book provides the right mix of practical how-to knowledge in a
straightforward, informative fashion that ties all plex pieces together with
real-world case studies. With so many books on the topic puter forensics,
Hacking puter Forensics, Second Edition, delivers the most valuable
insight on the market. The authors cut to the chase of what people must understand
to effectively puter forensic investigations.”
—Brian H. Karney, COO, AccessData Corporation
“Hacking puter Forensics is a ‘must-read’ for information security
professionals who want to develop their knowledge puter forensics.”
—Jason Fruge, Director of Consulting Services, Security
00- i 8/23/2009 3:54:42 AM
“Computer forensics has e increasingly important to modern incident
responders attempting to defend our digital castles. Hacking puter
Forensics, Second Edition, picks up where the first edition left off and provides a
valuable reference, useful to both beginning and seasoned forensic professionals. I
picked up several new tricks from this book, which I am already putting to use.”
—Monty McDougal, Raytheon Information Security Solutions, and author of
the Windows Forensic Toolchest (WFT) ()
“Hacking puter Forensics, Second Edition, is an essential reference for
both new and seasoned investigators. The second edition continues to provide
valuable information in a format that is easy to understand and reference.”
—Sean Conover, CISSP, CCE, EnCE
“This book is an outstanding point of reference puter forensics and
certainly a must-have addition to your forensic arsenal.”
—Brandon Foley, Manager of Enterprise IT Security, Harrah’s Operating Co.
“Starts out with the basics then gets DEEP technically. The addition of IP theft and
fraud issues is timely and make this second edition that much more valuable. This
is a core book for my entire forensics group.”
—Chris