logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

The Official Chfi Study Guide Exam 31249 For Computer Hacking Forensics Investigators Dave Kleiman

  • SKU: BELL-4342074
The Official Chfi Study Guide Exam 31249 For Computer Hacking Forensics Investigators Dave Kleiman
$ 31.00 $ 45.00 (-31%)

4.7

46 reviews

The Official Chfi Study Guide Exam 31249 For Computer Hacking Forensics Investigators Dave Kleiman instant download after payment.

Publisher: Syngress Pub
File Extension: PDF
File size: 41.76 MB
Pages: 932
Author: Dave Kleiman, Kevin Cardwell, Timothy Clinton, Michael Cross, Michael Gregg, Jesse Varsalone and Craig Wright (Eds.)
ISBN: 9781597491976, 1597491977
Language: English
Year: 2007

Product desciption

The Official Chfi Study Guide Exam 31249 For Computer Hacking Forensics Investigators Dave Kleiman by Dave Kleiman, Kevin Cardwell, Timothy Clinton, Michael Cross, Michael Gregg, Jesse Varsalone And Craig Wright (eds.) 9781597491976, 1597491977 instant download after payment.

Content:
Technical Editor, Page iii
Contributors, Pages iii-vi
Chapter 1 - Computer Forensics in Today's World, Pages 1-60
Chapter 2 - Systems, Disks, and Media, Pages 61-131
Chapter 3 - The Computer Investigation Process, Pages 133-195
Chapter 4 - Acquiring Data, Duplicating Data, and Recovering Deleted Files, Pages 197-263
Chapter 5 - Windows, Linux, and Macintosh Boot Processes, Pages 265-285
Chapter 6 - Windows and Linux Forensics, Pages 287-349
Chapter 7 - Steganography and Application Password Crackers, Pages 351-386
Chapter 8 - Computer-Assisted Attacks and Crimes, Pages 387-439
Chapter 9 - Investigating Network Traffic and Investigating Logs, Pages 441-467
Chapter 10 - Router Forensics and Network Forensics, Pages 469-485
Chapter 11 - Investigating Wireless Attacks, Pages 487-509
Chapter 12 - PDA, Blackberry, and iPod Forensics, Pages 511-542
Chapter 13 - Forensic Software and Hardware, Pages 543-616
Chapter 14 - Forensics Investigation Using EnCase, Pages 617-673
Chapter 15 - Incident Response, Pages 675-705
Chapter 16 - Types of Investigations, Pages 707-811
Appendix A - Becoming an Expert Witness, Pages 813-860
Appendix B - Worldwide Forensic Acts and Laws, Pages 861-920
Index, Pages 921-939

Related Products