Table of Contents
Chapter 1: Computer Forensics in Today’s World
Chapter 2: Systems, Disks, and Media
Chapter 3: The Computer Investigation Process
Chapter 4: Acquiring Data, Duplicating Data, and Recovering Deleted Files
Chapter 5: Windows, Linux, and Macintosh Boot Processes
Chapter 6: Windows and Linux Forensics
Chapter 7: Steganography and Application Password Crackers
Chapter 8: Computer-Assisted Attacks and Crimes
Chapter 9: Investigating Network Traffic and Investigating Logs
Chapter 10: Router Forensics and Network Forensics
Chapter 11: Investigating Wireless Attacks
Chapter 12: PDA, Blackberry, and iPod Forensics
Get The Official CHFI Study Guide (Exam 312-49) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.