Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Digital and Multimedia Forensic Evidence

Buy

In April 2005, I received a telephone call from Humana Press Senior Editor, Harvey Kane, inquiring whether there might be a need for a book to be published concerning the different aspects of computer forensics. During a subsequent meeting to discuss the current state of available texts covering this topic, I noted to Mr. Kane that there were several excellent computer forensics books already published and readily available. Mr. Kane then inquired as to what were some of the commonalities and differences between those books. My response was that they all discussed computer forensics analysis in detail. (Indeed, the purpose of one in particular was to guide the individual to becoming a skilled computer forensics examiner.) Furthermore, I indicated that some of the books included topics such as different operating systems as well as chapters on evidence collection and processing. Still others dealt specifically with incident response. Mr. Kane then asked me two questions: “If a person wanted to pursue a areer in computer forensics, is there any one book currently available that provides an overview?” and if not, “If you were to write a book on computer forensics, what topics would you include in the book?” The meeting ended with Mr. Kane asking me to draft a scope document concerning a possible book on computer forensics.

Shortly thereafter, I attended a local Infragard meeting. The speaker’s topic for the meeting was incident response and the role that computer forensics can play in identifying the evidence of a Denial of Service (DoS) attack. After the presentation, a number of those present asked the speaker such questions as: “What training is necessary to become an examiner in this field?” “How and where can you obtain such training?” “Where can you get the software to investigate this type of crime?” “Does an information technology (IT) person have to be certified?” “How do I go about obtaining certification?” “What certifications are available?” “What are the legal issues involved in searching and seizing digital data?” “What education is necessary to be hired in the IT field?” “What happens if you have to testify in court?”

Over the past several years, I have been asked many of those same questions by high school and college students and other individuals interested in entering the computer forensics field. One question in particular stands out: “How and where does a person look to obtain the necessary information if he or she is thinking of a career in this field?” All of these questions exemplify how difficult it is at times to obtain necessary information to make career choices.

(HTML tags aren't allowed.)

Bash Quick Start Guide: Get up and running with shell scripting with Bash
Bash Quick Start Guide: Get up and running with shell scripting with Bash

Learn how to write shell script effectively with Bash, to quickly and easily write powerful scripts to manage processes, automate tasks, and to redirect and filter program input and output in useful and novel ways.

Key Features

  • Demystify the Bash command line
  • Write shell...
3D Game Engine Architecture: Engineering Real-Time Applications with Wild Magic
3D Game Engine Architecture: Engineering Real-Time Applications with Wild Magic
Dave Eberly's 3D Game Engine Design was the first professional guide to the essential concepts and algorithms of real-time 3D engines and quickly became a classic of game development. Dave's new book 3D Game Engine Architecture continues the tradition with a comprehensive look at the software engineering and...
Transport Equations in Biology (Frontiers in Mathematics)
Transport Equations in Biology (Frontiers in Mathematics)
This book presents models written as partial differential equations and originating from various questions in population biology, such as physiologically structured equations, adaptive dynamics, and bacterial movement. Its purpose is to derive appropriate mathematical tools and qualitative properties of the solutions (long time behavior,...

A Basic English Grammar
A Basic English Grammar
Grammar reference in a clear, handy format.

A large-format book containing all the grammar from "A Basic English Grammar", and most of the exercises from "BEG: Exercises" together with some new ones, all integrated into the relevant grammar sections. The book has a key and is designed for self-study, resource centres
...
Instant: The Story of Polaroid
Instant: The Story of Polaroid

"Instant photography at the push of a button!" During the 1960s and '70s, Polaroid was the coolest technology company on earth. Like Apple, it was an innovation machine that cranked out one must-have product after another. Led by its own visionary genius founder, Edwin Land, Polaroid grew from a 1937 garage start-up into a...

Macromedia Flash MX 2004 for Rich Internet Applications
Macromedia Flash MX 2004 for Rich Internet Applications
The long-stale page metaphor for Web sites is finally dying out, replaced by the single-screen rich-Internet apps that Flash MX 2004 is at last bringing to the mainstream. To stay ahead of the curve--and to start creating the kind of Web sites you used to only dream of--you need this guide. In these pages you'll learn how to create the sites...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy