The Best Damn Cybercrime and Digital Forensics Book Period
By Anthony Reyes and Jack Wiles
3/5
()
About this ebook
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments investigating corporate espionage and criminal activities are learning as they go and need a comprehensive guide to e-discovery
* Appeals to law enforcement agencies with limited budgets
Anthony Reyes
Anthony Reyes is a retired Detective with the New York City Police Department’s Computer Crimes Squad. During his assignment with the Computer Crimes Squad, he investigated computer intrusion, fraud, identity theft, child exploitation, and software piracy. Detective Reyes previously sat as an alternate member of New York Governor George E. Pataki's Cyber-Security Task Force. Mr. Reyes is a member of the New York State Internet Crimes Against Children Taskforce. He is also a member of the National Institute of Justice Electronic Crime Partnership Initiative (ECPI). Additionally, he is a member of the High Technology Crime Investigation Association (HTCIA), and served as the President in 2005 of the Association’s Northeast Chapter.
Read more from Anthony Reyes
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors Rating: 3 out of 5 stars3/5Dreams Are Worth Dreaming: A Motivational Tale Rating: 0 out of 5 stars0 ratings
Related to The Best Damn Cybercrime and Digital Forensics Book Period
Related ebooks
Implementing Digital Forensic Readiness: From Reactive to Proactive Process Rating: 0 out of 5 stars0 ratingsComputer Forensics: A Pocket Guide Rating: 4 out of 5 stars4/5Botnets: The Killer Web Applications Rating: 5 out of 5 stars5/5Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility Rating: 3 out of 5 stars3/5Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Rating: 5 out of 5 stars5/5Mobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5Seven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Snort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Hands-on Incident Response and Digital Forensics Rating: 0 out of 5 stars0 ratingsMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Rating: 0 out of 5 stars0 ratingsMalware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides Rating: 4 out of 5 stars4/5Physical and Logical Security Convergence: Powered By Enterprise Security Management Rating: 0 out of 5 stars0 ratingsThe Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice Rating: 1 out of 5 stars1/5AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsWireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsReverse Engineering Code with IDA Pro Rating: 5 out of 5 stars5/5Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsMalware Forensics: Investigating and Analyzing Malicious Code Rating: 5 out of 5 stars5/5Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization Rating: 1 out of 5 stars1/5Digital Forensics: Threatscape and Best Practices Rating: 0 out of 5 stars0 ratingsDigital Evidence and Computer Crime: Forensic Science, Computers, and the Internet Rating: 4 out of 5 stars4/5The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Rating: 0 out of 5 stars0 ratingsInvestigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Rating: 0 out of 5 stars0 ratingsEssential Skills for Hackers Rating: 3 out of 5 stars3/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsCybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsHandbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5
Information Technology For You
Summary of Super-Intelligence From Nick Bostrom Rating: 5 out of 5 stars5/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5How To Use Chatgpt: Using Chatgpt To Make Money Online Has Never Been This Simple Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Supercommunicator: Explaining the Complicated So Anyone Can Understand Rating: 3 out of 5 stars3/5Panda3d 1.7 Game Developer's Cookbook Rating: 0 out of 5 stars0 ratingsHow to Write Effective Emails at Work Rating: 4 out of 5 stars4/5CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1101 Rating: 0 out of 5 stars0 ratingsLinux Command Line and Shell Scripting Bible Rating: 3 out of 5 stars3/5Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/5ChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5Health Informatics: Practical Guide Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Beginner's Guide to Information Security Rating: 0 out of 5 stars0 ratingsHow to Find a Wolf in Siberia (or, How to Troubleshoot Almost Anything) Rating: 0 out of 5 stars0 ratingsHandbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Data Analytics for Beginners: Introduction to Data Analytics Rating: 4 out of 5 stars4/5The Programmer's Brain: What every programmer needs to know about cognition Rating: 5 out of 5 stars5/5Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsInformation Security Best Practices: 205 Basic Rules Rating: 0 out of 5 stars0 ratingsComputer Organization and Design: The Hardware / Software Interface Rating: 4 out of 5 stars4/5AWS Certified Cloud Practitioner: Study Guide with Practice Questions and Labs Rating: 5 out of 5 stars5/5Data Governance For Dummies Rating: 0 out of 5 stars0 ratingsCompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsCODING INTERVIEW: Advanced Methods to Learn and Excel in Coding Interview Rating: 0 out of 5 stars0 ratings
Reviews for The Best Damn Cybercrime and Digital Forensics Book Period
2 ratings0 reviews