Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives
By Erik Laykin
1/5
()
Currently unavailable
Currently unavailable
About this ebook
"Having worked with Erik on some of the most challenging computer forensic investigations during the early years of this industry's formation as well as having competed with him earnestly in the marketplace...I can truly say that Erik is one of the unique pioneers of computer forensic investigations. He not only can distill complex technical information into easily understandable concepts, but he always retained a long-term global perspective on the relevancy of our work and on the impact of the information revolution on the social and business structures of tomorrow."
—From the Foreword by James Gordon, Managing Director, Navigant Consulting, Inc.
Get the knowledge you need to make informed decisions throughout the computer forensic investigation process
Investigative Computer Forensics zeroes in on a real need felt by lawyers, jurists, accountants, administrators, senior managers, and business executives around the globe: to understand the forensic investigation landscape before having an immediate and dire need for the services of a forensic investigator.
Author Erik Laykin—leader and pioneer of computer forensic investigations—presents complex technical information in easily understandable concepts, covering:
- A primer on computers and networks
- Computer forensic fundamentals
- Investigative fundamentals
- Objectives and challenges in investigative computer forensics
- E-discovery responsibilities
- The future of computer forensic investigations
Get the knowledge you need to make tough decisions during an internal investigation or while engaging the capabilities of a computer forensic professional with the proven guidance found in Investigative Computer Forensics.
Related to Investigative Computer Forensics
Related ebooks
Web Site Privacy with P3P Rating: 0 out of 5 stars0 ratingsDigital Forensics: Digital Evidence in Criminal Investigations Rating: 4 out of 5 stars4/5Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography Rating: 0 out of 5 stars0 ratingsHP NonStop Server Security: A Practical Handbook Rating: 0 out of 5 stars0 ratingsInvestigative Data Mining for Security and Criminal Detection Rating: 0 out of 5 stars0 ratingsBuilding the Data Warehouse Rating: 5 out of 5 stars5/5Implementing Homeland Security for Enterprise IT Rating: 0 out of 5 stars0 ratingsConfidential Information Sources: Public and Private Rating: 0 out of 5 stars0 ratingsAuditing Information Systems Rating: 0 out of 5 stars0 ratingsComputer Security Rating: 0 out of 5 stars0 ratingsCorporate Information Factory Rating: 1 out of 5 stars1/5Tech Mining: Exploiting New Technologies for Competitive Advantage Rating: 5 out of 5 stars5/5Security for Small Computer Systems: A Practical Guide for Users Rating: 0 out of 5 stars0 ratingsWAN Survival Guide: Strategies for VPNs and Multiservice Networks Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Study Guide: Network Security Essentials Rating: 0 out of 5 stars0 ratingsThe SSCP Prep Guide: Mastering the Seven Key Areas of System Security Rating: 0 out of 5 stars0 ratingsPeople and Organizations: Explorations of Human-Centered Design Rating: 0 out of 5 stars0 ratingsUltimate Computer Security Survey Rating: 0 out of 5 stars0 ratingsComputers and Data Processing: International Edition Rating: 0 out of 5 stars0 ratingsHack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit Rating: 3 out of 5 stars3/5Digital Forensics Basics: A Practical Guide Using Windows OS Rating: 0 out of 5 stars0 ratingsGPRS and 3G Wireless Applications: Professional Developer's Guide Rating: 2 out of 5 stars2/5The Ultimate Financial Security Survey Rating: 5 out of 5 stars5/5Wireless Internet Enterprise Applications: A Wiley Tech Brief Rating: 0 out of 5 stars0 ratingsFundamentals of Network Forensics: A Research Perspective Rating: 0 out of 5 stars0 ratingsKnowledge Processing and Applied Artificial Intelligence Rating: 0 out of 5 stars0 ratingsHighly Available Storage for Windows Servers Rating: 0 out of 5 stars0 ratingsHandbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5
Auditing For You
The Prosperity Bible Rating: 5 out of 5 stars5/5Auditing For Dummies Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5The Internal Auditing Pocket Guide: Preparing, Performing, Reporting and Follow-up Rating: 0 out of 5 stars0 ratings2022 Best Ways To Make Money Online Rating: 4 out of 5 stars4/5A Step By Step Guide: How to Perform Risk Based Internal Auditing for Internal Audit Beginners Rating: 4 out of 5 stars4/5Artificial Intelligence for Audit, Forensic Accounting, and Valuation: A Strategic Perspective Rating: 0 out of 5 stars0 ratingsThe Fraud Audit: Responding to the Risk of Fraud in Core Business Systems Rating: 0 out of 5 stars0 ratingsCutting Edge Internal Auditing Rating: 3 out of 5 stars3/5Mastering Internal Audit Fundamentals A Step-by-Step Approach Rating: 4 out of 5 stars4/5Auditing Your Human Resources Department: A Step-by-Step Guide to Assessing the Key Areas of Your Program Rating: 0 out of 5 stars0 ratingsThe Accredited Counter Fraud Specialist Handbook Rating: 0 out of 5 stars0 ratingsExposing Fraud: Skills, Process and Practicalities Rating: 4 out of 5 stars4/5Budgeting: How to Make a Budget and Manage Your Money and Personal Finances Like a Pro Rating: 0 out of 5 stars0 ratingsA Guide to Forensic Accounting Investigation Rating: 4 out of 5 stars4/5Fraud Casebook: Lessons from the Bad Side of Business Rating: 0 out of 5 stars0 ratingsHealthcare Fraud: Auditing and Detection Guide Rating: 0 out of 5 stars0 ratingsStrategic Consulting Frameworks: Consulting Preparation Rating: 0 out of 5 stars0 ratingsBreaking Into Risk Management In Banks Rating: 4 out of 5 stars4/5Budgeting - The Right Way Rating: 0 out of 5 stars0 ratingsDetecting Accounting Fraud Before It's Too Late Rating: 0 out of 5 stars0 ratingsTrafficking and the Traffickers: JUSTICE Rating: 0 out of 5 stars0 ratingsConstruction Contractors: Advanced Issues Rating: 0 out of 5 stars0 ratingsPreventing Fraud and Mismanagement in Government: Systems and Structures Rating: 4 out of 5 stars4/5Internal Audit Quality: Developing a Quality Assurance and Improvement Program Rating: 0 out of 5 stars0 ratingsThe Internal Auditing Handbook Rating: 0 out of 5 stars0 ratingsExecutive's Guide to COSO Internal Controls: Understanding and Implementing the New Framework Rating: 0 out of 5 stars0 ratingsLean Auditing: Driving Added Value and Efficiency in Internal Audit Rating: 5 out of 5 stars5/5Guidelines for Organization of Working Papers on Operational Audits Rating: 0 out of 5 stars0 ratings
Reviews for Investigative Computer Forensics
1 rating0 reviews