文档介绍:HACKING EXPOSED™
COMPUTER FORENSICS
SECOND EDITION
REVIEWS
“This book provides the right mix of practical how-to knowledge in a
straightforward, informative fashion that ties all plex pieces together with
real-world case studies. With so many books on the topic puter forensics,
Hacking puter Forensics, Second Edition, delivers the most valuable
insight on the market. The authors cut to the chase of what people must understand
to effectively puter forensic investigations.”
—Brian H. Karney, COO, AccessData Corporation
“Hacking puter Forensics is a ‘must-read’ for information security
professionals who want to develop their knowledge puter forensics.”
—Jason Fruge, Director of Consulting Services, Security
00- i 8/23/2009 3:54:42 AM
“Computer forensics has e increasingly important to modern incident
responders attempting to defend our digital castles. Hacking puter
Forensics, Second Edition, picks up where the first edition left off and provides a
valuable reference, useful to both beginning and seasoned forensic professionals. I
picked up several new tricks from this book, which I am already putting to use.”
—Monty McDougal, Raytheon Information Security Solutions, and author of
the Windows Forensic Toolchest (WFT) ()
“Hacking puter Forensics, Second Edition, is an essential reference for
both new and seasoned investigators. The second edition continues to provide
valuable information in a format that is easy to understand and reference.”
—Sean Conover, CISSP, CCE, EnCE
“This book is an outstanding point of reference puter forensics and
certainly a must-have addition to your forensic arsenal.”
—Brandon Foley, Manager of Enterprise IT Security, Harrah’s Operating Co.
“Starts out with the basics then gets DEEP technically. The addition of IP theft and
fraud issues is timely and make this second edition that much more valuable. This
is a core book for my entire forensics group.”
—Chris