Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 24,81
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Facebook Twitter Pinterest <Einbetten>
Computer Forensics InfoSec Pro Guide von [Cowen, David]
Anzeige für Kindle-App

Computer Forensics InfoSec Pro Guide Kindle Edition

5.0 von 5 Sternen 1 Kundenrezension

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 24,81

Kindle AusLese
Jeden Monat vier außergewöhnliche Neuerscheinungen für je nur 2,49 EUR - empfohlen vom Amazon-Team. Erfahren Sie mehr über das Programm und melden Sie sich beim Kindle AusLese Newsletter an.



Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.

You’ll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource.

Computer Forensics: InfoSec Pro Guide features:

  • Lingo—Common security terms defined so that you’re in the know on the job
  • IMHO—Frank and relevant opinions based on the author’s years of industry experience
  • Budget Note—Tips for getting security technologies and processes into your organization’s budget
  • In Actual Practice—Exceptions to the rules of security explained in real-world contexts
  • Your Plan—Customizable checklists you can use on the job now
  • Into Action—Tips on how, why, and when to apply new skills and techniques at work

Über den Autor und weitere Mitwirkende

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics.


  • Format: Kindle Edition
  • Dateigröße: 5103 KB
  • Seitenzahl der Print-Ausgabe: 344 Seiten
  • Verlag: McGraw-Hill Education; Auflage: 1 (19. April 2013)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B00BPO7AP8
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Verbesserter Schriftsatz: Aktiviert
  • Durchschnittliche Kundenbewertung: 5.0 von 5 Sternen 1 Kundenrezension
  • Amazon Bestseller-Rang: #450.724 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?


5.0 von 5 Sternen
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel


Format: Taschenbuch Verifizierter Kauf
If you are new in the subject of digital forensic - it is really good book. It discoveres the whole world of computer internals (based on Windows) touching almost every area. But if you already know something (mainly procedures in investigations) and have your favourite tool set ready - it is not book for you.

Once again - great starter!
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die hilfreichsten Kundenrezensionen auf (beta) 4.6 von 5 Sternen 19 Rezensionen
11 von 11 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen The best intro to forensics book out there! 8. April 2013
Von Jeffrey P. Rotenberger - Veröffentlicht auf
Format: Taschenbuch
I was fortunate enough to get an advance reviewer copy of David Cowen's new book - Computer Forensics: A Beginner's Guide. After reading it, honestly, I was annoyed and a little bit pissed. I have a Masters in Information Security and it was my Computer Forensics class that got me interested in this field. By comparison the textbook I had for that class was dry, dull, stale and inadequate in its task compared to this book. What I would have given to have this as a reference for that class. Fortunately, now I do!

For those that are unfamiliar with the author; David has co-authored Hacking Exposed: Computer Forensics, writes a popular forensic blog ([...]) and is an experience Computer Forensic Examiner in the state of Texas.

What's to like about this book? To me, the biggest selling point of this book is how it reads. If you like the style of the Hacking Exposed books then you'll enjoy David's writing style as well. It comes mostly as a first person narrative with David's experiences sprinkled liberally throughout the book; and that's a good thing. It becomes very obvious in the reading that not only does the author know what he's talking about, he knows how to communicate it to a wide audience. I finished the entire book in three sittings and I attribute that to how well it is written.
The topics covered flow very well; starting with chapters on getting started, what can be done with computer forensics, how to get training and where to find current information. For the beginner, these chapters are invaluable as they lay the groundwork for the rest of the book as well as providing some great external references for finding more information about forensics. For the experienced forensicator, these chapters are valuable as a way to introduce new people to what you do as well as providing a great reference list of places to keep up-to-date on computer forensics.

From here the book quickly moves into setting up your own lab, what tools (both hardware and software) you'll need, and how to start your first investigation. There's a great chapter here on the importance of testing your tools and how to test them as well as several chapters on different types of forensic cases. The most valuable sections of the book, however, were the final two chapters on the back end of every investigation - documenting and reporting. Why? Because so much of the information in our field focuses on the technical aspects; new tools, new artifacts, new malware, etc., however, all of that is moot if it isn't properly documented and reported. David fortunately doesn't gloss over these topics, instead giving them two skillfully written chapters that will serve experienced and new forensicators well.

Without covering every chapter, I'll instead say that David does an outstanding job of covering a very broad level of topics in computer forensics, including many that you wouldn't expect to be in a book for beginners. And while the focus is on beginners, this book would make an excellent addition to any computer forensicator's library.
That said I did have a few minor quibbles with the book. There were a few minor spelling errors and some grammar issues but I expect all of those will be referenced on the accompanying website ([...]) and fixed in future versions. Another issue I had was that a few chapters' topic introductions did not match up to the chapter summaries. For example, Chapter 8 deals with creating forensic images. The topics listed as being covered do not mention mobile devices, yet it is discussed briefly in the chapter and then listed as a skilled learned in the chapter summary. In reality, the chapter mentions that the topic is rapidly changing and no methods for imaging mobile devices are documented. For a beginner it may be frustrating to see a skill listed as `covered' in the chapter when it was not. This happens a few times in the book but should not seriously detract from what I consider to overall be an outstanding computer forensics book.

In summary, if you have any interest in computer forensics, I highly recommend this book. If you're teaching a course on the topic, please do yourself and your students a favor and use this as your textbook. Your students will thank you!

Notes: My ARC was in .pdf form with no Table of Contents, Introduction or Index so I cannot speak to any issues in those areas of the book. I also cannot speak to any formatting issues that might exist with other e-versions of the book. There were none in my version but they do sometimes occur across different e-formats.
9 von 9 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen This book delivers! 21. April 2013
Von shadowboxer - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
Like the reviewer before me, I became interested in digital forensics after a course in my masters degree program. IMHO, this book lives up to its name. As an infosec pro trying to go the DFIR route, I found this work to have the perfect balance of technical detail, legal discussion, career tips, and real-world applicability. I thoroughly enjoyed this book and am more inspired now than before. My only complaint is that the example images in the Kindle version were terrible. In retrospect, I should've purchased the paperback and will gladly shell out another $25 to get this on my bookshelf. Much respect and thanks to the author!
4 von 4 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Excellent resource for anyone in the field of digital forensics! 24. April 2013
Von Travis P Foley - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
This book is very well layed out giving new Digital Forensic Examiners a wealth of information all in one easy to read reference. I have only been in the field for a couple of years transitioning from a more traditional Information Security role and have found the information in this book to be the primary catalyst in my own growth and development.

The bottom line is this book allows the new Digital Forensic Examiner to benefit from the Author's years of hard work, knowledge, and experience saving A LOT of time, headaches, and allowing you hit the ground running in the right direction.

This resource is a must have for anyone in DFIR.
6 von 7 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Must have guide to starting a computer forensics career, or hobby. 8. Mai 2013
Von Ben Starbuck - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
I am a system admin of 5 years. I am looking to get into computer forensics. I purchased this book a week ago, and have been reading through it daily. This book goes into the subject matter with amazing precision, and the author doesn't hesitate to give you his personal opinions about how things really work, instead of just giving a theoretical best scenario environment.

I would high recommend this book to anyone wanting to get into forensics as a career or hobby. It has continually increased my hunger to learn, and one day, enter the field as a professional.
4.0 von 5 Sternen but easily the best first book you will purchase on computer ... 3. Dezember 2014
Von Jason Scott Whetzel - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
This is far from your first book, but easily the best first book you will purchase on computer forensics. Mr Cowen does an excellent job of introducing the subject matter and providing references and introducing the new learner to the community. This book is written in a very easy to read manner filled with personal pronouns and plain language. Mr Cowen does not waste time trying to church up the technical aspects and instead presents and introduces the material as it is, simply. This book is filled with the most basic techniques and methods used in computer forensics. At 282 pages, this is not a thick book, nor is it a complicated one. This is not your last book. Far from it, but it is your best first book. Going into the field, I was surprised how few books there are on the subject and those few there are, are very deep and technical in specific techniques that are rarely or unlikely to be encountered in the field. This book bridges that gap.

That being the case, where this book lacks.

There are no labs. Mr Cowen often gives links and screen shots of the data and how to go about finding it, but provides no labs. This is understandable for the sake of brevity, but in such a short book, it could have been added. Because the book covers SETH, ENCASE and FTK equally, along with both physical and Software write blockers, Mr Cowen assumedly left out labs because he couldn't cover all instances, especially not in a book he hopes to cover the basics. I understand that, but it seems Mr Cowen is trying to talk to the person already in the field, who is the least likely to purchase his book or at least benefit from it. The labs would have been served well in instructing the new student in the basic techniques, if not the specific tools.

Its for this simple reason I left out 1 star. Regardless, I highly recommend this book, and the information pertaining to the community itself is priceless, even for the established forensic examiner.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.
click to open popover