In weniger als einer Minute können Sie mit dem Lesen von Computer Forensics InfoSec Pro Guide auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen oder mit einer unserer kostenlosen Kindle Lese-Apps sofort zu lesen anfangen.

An Ihren Kindle oder ein anderes Gerät senden


Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Keine Abbildung vorhanden

Computer Forensics InfoSec Pro Guide [Kindle Edition]

David Cowen
5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)

Kindle-Preis: EUR 23,80 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Kostenlose Kindle-Leseanwendung Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 23,80  
Taschenbuch EUR 25,95  



Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.

You’ll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource.

Computer Forensics: InfoSec Pro Guide features:

  • Lingo—Common security terms defined so that you’re in the know on the job
  • IMHO—Frank and relevant opinions based on the author’s years of industry experience
  • Budget Note—Tips for getting security technologies and processes into your organization’s budget
  • In Actual Practice—Exceptions to the rules of security explained in real-world contexts
  • Your Plan—Customizable checklists you can use on the job now
  • Into Action—Tips on how, why, and when to apply new skills and techniques at work

Über den Autor und weitere Mitwirkende

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics.


Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr


4 Sterne
3 Sterne
2 Sterne
1 Sterne
5.0 von 5 Sternen
5.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
5.0 von 5 Sternen Good for start 9. Dezember 2013
Format:Taschenbuch|Verifizierter Kauf
If you are new in the subject of digital forensic - it is really good book. It discoveres the whole world of computer internals (based on Windows) touching almost every area. But if you already know something (mainly procedures in investigations) and have your favourite tool set ready - it is not book for you.

Once again - great starter!
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf (beta) 4.7 von 5 Sternen  15 Rezensionen
10 von 10 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen The best intro to forensics book out there! 8. April 2013
Von Jeffrey P. Rotenberger - Veröffentlicht auf
I was fortunate enough to get an advance reviewer copy of David Cowen's new book - Computer Forensics: A Beginner's Guide. After reading it, honestly, I was annoyed and a little bit pissed. I have a Masters in Information Security and it was my Computer Forensics class that got me interested in this field. By comparison the textbook I had for that class was dry, dull, stale and inadequate in its task compared to this book. What I would have given to have this as a reference for that class. Fortunately, now I do!

For those that are unfamiliar with the author; David has co-authored Hacking Exposed: Computer Forensics, writes a popular forensic blog ([...]) and is an experience Computer Forensic Examiner in the state of Texas.

What's to like about this book? To me, the biggest selling point of this book is how it reads. If you like the style of the Hacking Exposed books then you'll enjoy David's writing style as well. It comes mostly as a first person narrative with David's experiences sprinkled liberally throughout the book; and that's a good thing. It becomes very obvious in the reading that not only does the author know what he's talking about, he knows how to communicate it to a wide audience. I finished the entire book in three sittings and I attribute that to how well it is written.
The topics covered flow very well; starting with chapters on getting started, what can be done with computer forensics, how to get training and where to find current information. For the beginner, these chapters are invaluable as they lay the groundwork for the rest of the book as well as providing some great external references for finding more information about forensics. For the experienced forensicator, these chapters are valuable as a way to introduce new people to what you do as well as providing a great reference list of places to keep up-to-date on computer forensics.

From here the book quickly moves into setting up your own lab, what tools (both hardware and software) you'll need, and how to start your first investigation. There's a great chapter here on the importance of testing your tools and how to test them as well as several chapters on different types of forensic cases. The most valuable sections of the book, however, were the final two chapters on the back end of every investigation - documenting and reporting. Why? Because so much of the information in our field focuses on the technical aspects; new tools, new artifacts, new malware, etc., however, all of that is moot if it isn't properly documented and reported. David fortunately doesn't gloss over these topics, instead giving them two skillfully written chapters that will serve experienced and new forensicators well.

Without covering every chapter, I'll instead say that David does an outstanding job of covering a very broad level of topics in computer forensics, including many that you wouldn't expect to be in a book for beginners. And while the focus is on beginners, this book would make an excellent addition to any computer forensicator's library.
That said I did have a few minor quibbles with the book. There were a few minor spelling errors and some grammar issues but I expect all of those will be referenced on the accompanying website ([...]) and fixed in future versions. Another issue I had was that a few chapters' topic introductions did not match up to the chapter summaries. For example, Chapter 8 deals with creating forensic images. The topics listed as being covered do not mention mobile devices, yet it is discussed briefly in the chapter and then listed as a skilled learned in the chapter summary. In reality, the chapter mentions that the topic is rapidly changing and no methods for imaging mobile devices are documented. For a beginner it may be frustrating to see a skill listed as `covered' in the chapter when it was not. This happens a few times in the book but should not seriously detract from what I consider to overall be an outstanding computer forensics book.

In summary, if you have any interest in computer forensics, I highly recommend this book. If you're teaching a course on the topic, please do yourself and your students a favor and use this as your textbook. Your students will thank you!

Notes: My ARC was in .pdf form with no Table of Contents, Introduction or Index so I cannot speak to any issues in those areas of the book. I also cannot speak to any formatting issues that might exist with other e-versions of the book. There were none in my version but they do sometimes occur across different e-formats.
9 von 9 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen This book delivers! 21. April 2013
Von shadowboxer - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
Like the reviewer before me, I became interested in digital forensics after a course in my masters degree program. IMHO, this book lives up to its name. As an infosec pro trying to go the DFIR route, I found this work to have the perfect balance of technical detail, legal discussion, career tips, and real-world applicability. I thoroughly enjoyed this book and am more inspired now than before. My only complaint is that the example images in the Kindle version were terrible. In retrospect, I should've purchased the paperback and will gladly shell out another $25 to get this on my bookshelf. Much respect and thanks to the author!
6 von 6 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Must have guide to starting a computer forensics career, or hobby. 8. Mai 2013
Von Ben Starbuck - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
I am a system admin of 5 years. I am looking to get into computer forensics. I purchased this book a week ago, and have been reading through it daily. This book goes into the subject matter with amazing precision, and the author doesn't hesitate to give you his personal opinions about how things really work, instead of just giving a theoretical best scenario environment.

I would high recommend this book to anyone wanting to get into forensics as a career or hobby. It has continually increased my hunger to learn, and one day, enter the field as a professional.
4 von 4 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Excellent resource for anyone in the field of digital forensics! 24. April 2013
Von Travis P Foley - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
This book is very well layed out giving new Digital Forensic Examiners a wealth of information all in one easy to read reference. I have only been in the field for a couple of years transitioning from a more traditional Information Security role and have found the information in this book to be the primary catalyst in my own growth and development.

The bottom line is this book allows the new Digital Forensic Examiner to benefit from the Author's years of hard work, knowledge, and experience saving A LOT of time, headaches, and allowing you hit the ground running in the right direction.

This resource is a must have for anyone in DFIR.
1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good reference 6. Dezember 2013
Von Kindle Customer - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
This is a good reference guide. I was looking for something more indepth. If you are looking for basic information and not how to make TOR work, you are in good shape. Lots of good information. I purchased it as a reference for my computer forensic classes. Good stuff
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Erster Beitrag:
Eingabe des Log-ins

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen

Ähnliche Artikel finden