Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE)

Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE)

2527 Views
MRP : ₹80.00
Price : ₹64.00
You will save : ₹16.00 after 20% Discount
Inclusive of all taxes
INSTANT delivery: Read it now on your device

Save extra with 2 Offers

Get ₹ 50

Instant Cashback on the purchase of ₹ 400 or above
SAVE05 Already Applied

Product Specifications

Publisher Technical Publications All Information Technology books by Technical Publications
ISBN 9789389750690
Author: I. A. Dhotre
Number of Pages 66
Edition First Edition
Available
Available in all digital devices
  • Snapshot
  • About the book
  • Sample book
Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE)   - Page 1 Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE)   - Page 2 Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE)   - Page 3 Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE)   - Page 4 Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE)   - Page 5

Computer Forensics For JNTU-H 16 Course (IV - II -CSE - CS863PE) by I. A. Dhotre
Book Summary:

The importance of Computer Forensics is well known in various engineering fields. Overwhelming response to our books on various subjects inspired us to write this book. The book is structured to cover the key aspects of the subject Computer Forensics.

The book uses plain, lucid language to explain fundamentals of this subject. The book provides logical method of explaining various complicated concepts and stepwise methods to explain the important topics. Each chapter is well supported with necessary illustrations, practical examples and solved problems. All the chapters in the book are arranged in a proper sequence that permits each topic to build upon earlier studies. All care has been taken to make students comfortable in understanding the basic concepts of the subject.

Audience of the Book :
This book Useful for Engineering Students.
Table of Content:

Chapter - 1 Introduction of Cybercrime

Chapter - 2 Initial Response and Forensic Duplication

Chapter - 3 Forensics Analysis and Validation

Chapter - 4 Current Forensic Tools

Chapter - 5 File Systems