The Official CHFI Study Guide (Exam 312-49) | 11.8 MB
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide.
It was written for security professionals, systems administrators, IT
consultants, legal professionals, IT managers, police and law
enforcement personnel studying for the CHFI certification, and
professionals needing the skills to identify an intruders footprints
and properly gather the necessary evidence to prosecute. Key features
include:
The Only Official Study Guide for CHFI
- Provides 100% coverage of all exam objectives.
- Full Web-based Exam
- Modeled after the real exam, it also includes explanations of correct and incorrect answers.
- Exam Objectives
- Each is clearly explained at the beginning of the chapter.
- Notes and Alerts
- Highlight crucial points of the exam modules.
- Exam Objectives Fast Track
- Bulleted highlights emphasize the important points from the exams perspective at the end of the chapter.
Key Terms :
- All concepts are defined and explained as they appear.
- Exam Objectives Frequently Asked Questions
- Test what you have learned by reading FAQs based on the material covered in the chapter.
- Log on to the Syngress Web site to access review questions based on the exam.
Table of Contents
Chapter 1. Computer Forensics in Todays World
Chapter 2. Systems, Disks, and Media
Chapter 3. The Computer Investigation Process
Chapter 4. Acquiring Data, Duplicating Data, and Recovering Deleted Files
Chapter 5. Windows, Linux, and Macintosh Boot Processes
Chapter 6. Windows and Linux Forensics
Chapter 7. Steganography and Application Password Crackers
Chapter 8. Computer-Assisted Attacks and Crimes
Chapter 9. Investigating Network Traffic and Investigating Logs
Chapter 10. Router Forensics and Network Forensics
Chapter 11. Investigating Wireless Attacks
Chapter 12. PDA, Blackberry, and iPod Forensics
Chapter 13. Forensic Software and Hardware
Chapter 14. Forensics Investigation Using EnCase
Chapter 15. Incident Response
Chapter 16. Types of Investigations
Appendix A. Becoming an Expert Witness
Appendix B. Worldwide Forensic Acts and Laws
Index
Chapter 2. Systems, Disks, and Media
Chapter 3. The Computer Investigation Process
Chapter 4. Acquiring Data, Duplicating Data, and Recovering Deleted Files
Chapter 5. Windows, Linux, and Macintosh Boot Processes
Chapter 6. Windows and Linux Forensics
Chapter 7. Steganography and Application Password Crackers
Chapter 8. Computer-Assisted Attacks and Crimes
Chapter 9. Investigating Network Traffic and Investigating Logs
Chapter 10. Router Forensics and Network Forensics
Chapter 11. Investigating Wireless Attacks
Chapter 12. PDA, Blackberry, and iPod Forensics
Chapter 13. Forensic Software and Hardware
Chapter 14. Forensics Investigation Using EnCase
Chapter 15. Incident Response
Chapter 16. Types of Investigations
Appendix A. Becoming an Expert Witness
Appendix B. Worldwide Forensic Acts and Laws
Index
Book Details
Paperback: 960 pages
Publisher: Syngress (November 2007)
Language: English
ISBN-10: 1597491977
ISBN-13: 978-1597491976
File Size: 11.8 MiB
Paperback: 960 pages
Publisher: Syngress (November 2007)
Language: English
ISBN-10: 1597491977
ISBN-13: 978-1597491976
File Size: 11.8 MiB
Code: |
http://adf.ly/7YDY8 |
No comments:
Post a Comment