Студенческий сайт КФУ - ex ТНУ » Учебный раздел » Учебные файлы »ПРОГРАММИРОВАНИЕ

Computer Forensics with FTK

Fernando Carbone
Тип: pdf
Категория: ПРОГРАММИРОВАНИЕ
Скачать
Купить

With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals achieve these goals. It is extremely useful for conducting digital investigations, helping you conduct a thorough investigation through a single tool and ensure the integrity of evidence. It is hard to find technical information on this tool and that s where this book will come in handy, helping professionals perform their activities with greater excellence.
This tutorial leads by example, providing you with everything you need to use FTK and the tools included such as FTK Imager, Registry View, and PRTK in order to enhance your Computer Forensics knowledge in an easier and more efficient way.
Другие файлы:

The Best Damn Cybercrime and Digital Forensics Book Period
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in...

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics,...

Incident Response & Computer Forensics, Third Edition
The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and...

Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct ou...

Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, onlin...