Computer forensics and digital investigation with EnCase Forensic v7

This book reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. It illustrates each concept using downloadable evidence from the National Institute of Sta...

Full description

Bibliographic Details
Main Author: Widup, Suzanne
Format: eBook
Language:English
Published: New York McGraw-Hill Education 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02519nmm a2200349 u 4500
001 EB001914836
003 EBX01000000000000001077738
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780071807920 
050 4 |a HV8079.C65 
100 1 |a Widup, Suzanne 
245 0 0 |a Computer forensics and digital investigation with EnCase Forensic v7  |c Suzanne Widup 
260 |a New York  |b McGraw-Hill Education  |c 2014 
300 |a 1 volume  |b illustrations 
505 0 |a The road to readiness -- Getting started -- EnCase concepts -- Adding evidence -- Processing evidence -- Documenting evidence -- Further inspection -- Analyzing the case -- Keywords and searching -- Conditions and filters -- Hash analysis and timelines -- Reporting -- Wrapping up the case -- EnCase portable and app central -- An EnScript primer 
653 |a Criminalité informatique / Enquêtes / Logiciels 
653 |a Criminalité informatique / Enquêtes 
653 |a Computer crimes / Investigation / fast 
653 |a Computer crimes / Investigation / Computer programs 
653 |a Computer crimes / Investigation / http://id.loc.gov/authorities/subjects/sh85029493 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
776 |z 0071807918 
776 |z 9780071807913 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071807913/?ar  |x Verlag  |3 Volltext 
082 0 |a 363.25/968028553 
082 0 |a 364.1 
520 |a This book reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. It illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide. You will learn how to: install EnCase Forensic v7 and customize the user interface; prepare your investigation and set up a new case; collect and verify evidence from suspect computers and networks; use the EnCase Evidence Processor and Case Analyzer; uncover clues using keyword searches and filter results through GREP; work with bookmarks, timelines, hash sets, and libraries; handle case closure, final disposition, and evidence destruction; carry out field investigations using EnCase Portable; learn to program in EnCase EnScript. --