The official CHFI exam 312-49 study guide for computer hacking forensics investigators

This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The EC-Council offers certifi...

Descripción completa

Detalles Bibliográficos
Otros Autores: Kleiman, Dave, author (author), Kleiman, Dave (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress Pub c2007.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627144706719
Tabla de Contenidos:
  • Front Cover; The Official CHFI Exam 312-49 Study Guide: For Computer Hacking Forensics Investigators; Copyright Page; Contents; Chapter 1. Computer Forensics in Today's World; Introduction; The History of Forensics; The Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Computer Forensics: Rules, Procedures, and Legal Issues; The Computer Forensic Lab; Laboratory Strategic Planning for Business; Elements of Facilities Build-out; Electrical and Power Plant Considerations; Essential Laboratory Tools
  • Summary of Exam ObjectivesExam Objectives Fast Track; Exam Objectives Frequently Asked Questions; Notes; Chapter 2. Systems, Disks, and Media; Introduction; File Systems and Hard Disks; Digital Media Devices; Image File Forensics; Summary of Exam Objectives; Exam Objectives Fast Track; Exam Objectives Frequently Asked Questions; Chapter 3. The Computer Investigation Process; Introduction; Investigating Computer Crime; Investigating Company Policy Violations; Conducting a Computer Forensic Investigation; Summary of Exam Objectives; Exam Objectives Fast Track
  • Exam Objectives Frequently Asked QuestionsChapter 4. Acquiring Data, Duplicating Data, and Recovering Deleted Files; Introduction; Recovering Deleted Files and Deleted Partitions; Data Acquisition and Duplication; Summary of Exam Objectives; Exam Objectives Fast Track; Exam Objectives Frequently Asked Questions; Chapter 5. Windows, Linux, and Macintosh Boot Processes; Introduction; The Boot Process; The Macintosh Boot Process; Macintosh Forensic Software; Summary of Exam Objectives; Exam Objectives Fast Track; Exam Objectives Frequently Asked Questions; Chapter 6. Windows and Linux Forensics
  • IntroductionWindows Forensics; Linux Forensics; Summary of Exam Objectives; Exam Objectives Frequently Asked Questions; Chapter 7. Steganography and Application Password Crackers; Introduction; Classification of Steganography; Six Categories of Steganography in Forensics; Types of Steganography; Application of"" Steganography; Hiding in Network Packets; Issues in Information Hiding; StegTools; Steganography vs. Watermarking; Attacking Watermarking; Detecting and Attacking Steganography; Application Password Cracking; Summary of Exam Objectives; Exam Objectives Fast Track
  • Exam Objectives Frequently Asked QuestionsChapter 8. Computer-Assisted Attacks and Crimes; Introduction; E-mail Clients and Servers; E-mail Crimes and Violations; Investigating E-mail Crimes and Violations; Microsoft Outlook; Tracing an E-mail Message; Handling Spam; Investigating Denial-of-Service Attacks; Investigating Web Attacks; Exam Objectives Summary; Exam Objectives Fast Track; Exam Objectives Frequently Asked Questions; Chapter 9. Investigating Network Traffic and Investigating Logs; Introduction; Overview of the OSI Model; Network Addresses and NAT
  • Network Information-Gathering Tools