Sign in

Hacking exposed computer forensics

by
0.0 0 ratings

About this book

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.

Details

OpenLibrary OL16922568W
Source OpenLibrary

Community Reviews

Sign in to rate and review this book

Sign in

No reviews yet. The silence is deafening. Be the main character and write one.

Readers also enjoyed