Flash Sale Alert! 20% Off for the Next 24 Hours!
Menu
Hacking Exposed Computer Forensics, 2nd Edition - Cybersecurity & Digital Investigation Guide for IT Professionals & Law Enforcement
$28.09
$51.09
Safe 45%
Hacking Exposed Computer Forensics, 2nd Edition - Cybersecurity & Digital Investigation Guide for IT Professionals & Law Enforcement
Hacking Exposed Computer Forensics, 2nd Edition - Cybersecurity & Digital Investigation Guide for IT Professionals & Law Enforcement
Hacking Exposed Computer Forensics, 2nd Edition - Cybersecurity & Digital Investigation Guide for IT Professionals & Law Enforcement
$28.09
$51.09
45% Off
Quantity:
Delivery & Return: Free shipping on all orders over $50
Estimated Delivery: 10-15 days international
24 people viewing this product right now!
SKU: 38206141
Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay
shop
Description
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The latest strategies for investigating cyber-crimeIdentify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.Effectively uncover, capture, and prepare evidence for investigationStore and process collected data in a highly secure digital forensic labRestore deleted documents, partitions, user activities, and file systemsAnalyze evidence gathered from Windows, Linux, and Macintosh systemsUse the latest Web and client-based e-mail tools to extract relevant artifactsOvercome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devicesPrepare legal documents that will hold up to judicial and defense scrutiny
More
Shipping & Returns

For all orders exceeding a value of 100USD shipping is offered for free.

Returns will be accepted for up to 10 days of Customer’s receipt or tracking number on unworn items. You, as a Customer, are obliged to inform us via email before you return the item.

Otherwise, standard shipping charges apply. Check out our delivery Terms & Conditions for more details.

Reviews
*****
Verified Buyer
5
Helps with class.

You May Also Like

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Allow cookies", you consent to our use of cookies. More Information see our Privacy Policy.
Top