Cargando…

The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator.

This is the official CHFI study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Kleiman, Dave
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Syngress, 2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn166388052
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 070829s2007 xx ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d YDXCP  |d BAKER  |d OCLCQ  |d DKDLA  |d OCLCQ  |d OCLCF  |d UMI  |d DEBBG  |d OCLCQ  |d OCLCA  |d D6H  |d CEF  |d UAB  |d LEAUB  |d AU@  |d OCLCQ  |d KSU  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 171111157  |a 488135285  |a 767763310  |a 874926438 
020 |a 9781597491976 
020 |a 1597491977 
020 |a 9780080555713 
020 |a 0080555713 
029 1 |a AU@  |b 000060844887 
029 1 |a CHBIS  |b 005828111 
029 1 |a CHNEW  |b 001007080 
029 1 |a CHVBK  |b 168565919 
029 1 |a DEBBG  |b BV039828934 
029 1 |a DEBBG  |b BV042031492 
029 1 |a DEBBG  |b BV042314238 
029 1 |a DEBSZ  |b 405315775 
029 1 |a DEBSZ  |b 41416945X 
029 1 |a NZ1  |b 12059938 
029 1 |a NZ1  |b 15189279 
035 |a (OCoLC)166388052  |z (OCoLC)171111157  |z (OCoLC)488135285  |z (OCoLC)767763310  |z (OCoLC)874926438 
037 |a 141248:141391  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b O34 2007eb 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 4 |a The official CHFI study guide (Exam 312-49) :  |b for computer hacking forensic investigator. 
260 |a [Place of publication not identified] :  |b Syngress,  |c 2007. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This is the official CHFI study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit. The material is presented in a logical learning sequence: a section builds upon previous sections and a chapter on previous chapters. All concepts, simple and complex, are defined and explained when they appear for the first time. This book includes the following special chapter elements: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight the crucial points, Exams Eye View section at the end of each chapter emphasizes the important points from the exams perspective, Key Terms present the definitions of key terms used in the chapter, Review Questions section at the end of each chapter that contains the questions modeled after the real exam questions based on the material covered in the chapter. The answers to these questions are presented with explanations in an appendix. Also included is a full practice exam modeled after the real exam. The answers to the exam questions are presented with full explanations. * The only study guide for CHFI, provides 100% coverage of all exam objectives. * Full web-based practice exam with explanations of correct and incorrect answers * Forensics xxxxx. 
505 0 |a Computer Forensics in Todays World -- Law And Computer Forensics -- Computer Investigation Process -- Computer Security Incident Response Team -- Computer Forensic Laboratory Requirements -- Understanding File systems and Hard disks -- Windows Forensics -- Linux and Macintosh Boot processes -- Linux Forensics -- Data Acquisition and Duplication -- Recovering Deleted Files -- Image Files Forensics -- Steganography -- Computer Forensic Tools -- Application password crackers -- Investigating Logs -- Investigating network traffic -- Router Forensics -- Investigating Web Attacks -- Tracking E-mails and Investigating E-mail crimes -- Mobile and PDA Forensics -- Investigating Trademark and Copyright Infringement -- Investigative Reports -- Becoming an Expert Witness -- Forensics in action. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes. 
650 6 |a Sécurité informatique. 
650 6 |a Criminalité informatique. 
650 7 |a Computer crimes  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Kleiman, Dave. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597491976/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Baker & Taylor  |b BKTY  |c 59.95  |d 59.95  |i 1597491977  |n 0007189097  |s active 
938 |a YBP Library Services  |b YANK  |n 2563350 
994 |a 92  |b IZTAP