Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Buy

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.

IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world.

The TechnoSecurity Guide to Digital Forensics and E-Discovery features:

* Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics
* Bonus chapters on how to build your own Forensics Lab
* 50% discount to the upcoming Techno Forensics conference for everyone
who purchases a book

About the Author

Jack Wiles is a Security Professional with over 30 years experience in security-related fields, including computer security, disaster recovery, and physical security. He is a professional speaker and has trained federal agents, corporate attorneys, and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects that are now being labeled Homeland Security topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a cofounder and President of TheTrainingCo. and is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, U.S. Customs, Department of Justice, the Department of Defense, and numerous members of High-Tech Crime units. He was also appointed as the first president of the North Carolina InfraGard chapter, which is now one of the largest chapters in the country. He is also a founding member and official MC of the U.S. Secret Service South Carolina Electronic Crimes Task Force.

Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967-68. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career. In his spare time, he has been a senior contributing editor for several local, national, and international magazines.

(HTML tags aren't allowed.)

Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Promising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism

It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security...

The Evolution of Hominin Diets: Integrating Approaches to the Study of Palaeolithic Subsistence
The Evolution of Hominin Diets: Integrating Approaches to the Study of Palaeolithic Subsistence
This volume brings together new and important research from the top experts in hominid diets across multiple fields. The objective of the volume is to explore if there is a consensus between the different methods, allowing us to better understand the nature of hominin dietary strategies through time. Contributions focus on modern studies, faunal...
For Your Body Only: Discover the Diet You Were Born to Eat
For Your Body Only: Discover the Diet You Were Born to Eat

Cracking the code to the perfect personalized diet—and a lifetime of super-health Have you ever wondered why a new diet is invented almost every other day, yet obesity levels and disease in this country remain at an all-time high? Have you wondered why the diet that works so well for your friend has no impact on you—or even makes...


UML in Practice: The Art of Modeling Software Systems Demonstrated through Worked Examples and Solutions
UML in Practice: The Art of Modeling Software Systems Demonstrated through Worked Examples and Solutions

For several years now, there has been a constant increase in the number of works on UML and object modelling. However, my practical experience of training (more than a thousand or so people trained in OMT, then UML since 1993…) convinced me that there is still another need that is not tended to by the multitude of books...

Graph Classification and Clustering Based on Vector Space Embedding
Graph Classification and Clustering Based on Vector Space Embedding
Due to the ability of graphs to represent properties of entities and binary relations at the same time, a growing interest in graph based object repre sentation can be observed in science and engineering. Yet, graphs are still not the common data structure in pattern recognition and related fields. The reason for this is twofold. First,...
Handbook of Environmental Fluid Dynamics, Two-Volume Set: Handbook of Environmental Fluid Dynamics, Volume Two: Systems, Pollution, Modeling, and Measurements
Handbook of Environmental Fluid Dynamics, Two-Volume Set: Handbook of Environmental Fluid Dynamics, Volume Two: Systems, Pollution, Modeling, and Measurements

With major implications for applied physics, engineering, and the natural and social sciences, the rapidly growing area of environmental fluid dynamics focuses on the interactions of human activities, environment, and fluid motion. A landmark for the field, the two-volume Handbook of Environmental Fluid Dynamics presents the basic...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy