Learn Computer Forensics : William Oettinger (Author)

Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition.
Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.


CISA – Certified Information Systems Auditor

Achieve CISA certification with practical examples and over 850 exam-oriented practice questions 2nd ed. Edition

AWS Certified Security

Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios.

Computer Networking Bible

The Complete Crash Course to Effectively Design, Implement and Manage Networks. Including Sections on Security, Performance and Scalability Paperback

Cybersecurity Career Master Plan

Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.

Practical Mobile Forensics

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This updated fourth edition of Practical Mobile Forensics delves into the concepts of mobile forensics and its importance in today’s world.

Practical Linux Forensics

Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices

Digital Forensics and Incident Response

After covering the fundamentals of incident response that are critical to any information security team, you’ll explore incident response frameworks.

Linux Basics for Hackers

First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables.

Network Basics for Hackers

Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex
Shopping cart
Sign in

No account yet?

Start typing to see products you are looking for.