{"id":8999,"date":"2025-11-26T14:24:35","date_gmt":"2025-11-26T20:24:35","guid":{"rendered":"https:\/\/idsinc.com\/publication\/federal-judges-guide-to-discovery-edition-3-0-copy\/"},"modified":"2025-11-26T14:32:13","modified_gmt":"2025-11-26T20:32:13","slug":"informatica-forense","status":"publish","type":"publications","link":"https:\/\/idsinc.com\/es\/publication\/computer-forensics\/","title":{"rendered":"Inform\u00e1tica forense: Fundamentos de respuesta a incidentes, 1.\u00aa edici\u00f3n"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\"><strong>por <a href=\"https:\/\/idsinc.com\/es\/equipo\/warren-kruse\/\" target=\"_blank\" rel=\"noreferrer noopener\">Warren G. Kruse II<\/a> y <a href=\"https:\/\/www.amazon.com\/s\/ref=dp_byline_sr_book_2?ie=UTF8&amp;field-author=Jay+G.+Heiser&amp;text=Jay+G.+Heiser&amp;sort=relevancerank&amp;search-alias=books\">Jay G. Heiser<\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background\" style=\"background-color:#f1f1f1;color:#f1f1f1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">Todo delito inform\u00e1tico deja rastros; solo hay que saber d\u00f3nde encontrarlos. Este libro muestra c\u00f3mo recopilar y analizar la evidencia digital que queda en la escena de un delito digital. Las computadoras siempre han sido susceptibles a intrusiones no deseadas, pero a medida que aumenta la sofisticaci\u00f3n de la tecnolog\u00eda inform\u00e1tica, tambi\u00e9n aumenta la necesidad de anticipar y protegerse contra el correspondiente aumento de la actividad delictiva relacionada con la inform\u00e1tica.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El libro &quot;Inform\u00e1tica Forense&quot; est\u00e1 dirigido a todos aquellos responsables de investigar incidentes delictivos digitales o interesados en las t\u00e9cnicas que utilizan estos investigadores. Es igualmente \u00fatil para quienes investigan servidores web pirateados y el origen de la pornograf\u00eda ilegal.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.amazon.com\/Computer-Forensics-Incident-Response-Essentials\/dp\/0201707195#:~:text=Written%20by%20two%20experts%20in,evidence%20through%20the%20final%20report\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Obtenga su copia<\/strong><\/a><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>by Warren G. Kruse II and Jay G. Heiser Every computer crime leaves tracks\u2014you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":8969,"parent":0,"menu_order":0,"template":"","categories":[23,20],"tags":[],"publication_category":[28,25],"class_list":["post-8999","publications","type-publications","status-publish","has-post-thumbnail","hentry","category-books","category-publications","publication_category-all-publications","publication_category-books","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Computer Forensics: Incident Response Essentials 1st Edition - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/publicacion\/informatica-forense\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Forensics: Incident Response Essentials 1st Edition\" \/>\n<meta property=\"og:description\" content=\"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/publicacion\/informatica-forense\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T20:32:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1103\" \/>\n\t<meta property=\"og:image:height\" content=\"1360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/\",\"name\":\"Computer Forensics: Incident Response Essentials 1st Edition - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Computer-Forensics.jpg\",\"datePublished\":\"2025-11-26T20:24:35+00:00\",\"dateModified\":\"2025-11-26T20:32:13+00:00\",\"description\":\"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Computer-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Computer-Forensics.jpg\",\"width\":1103,\"height\":1360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\",\"item\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Computer Forensics: Incident Response Essentials 1st Edition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inform\u00e1tica forense: Fundamentos de respuesta a incidentes, 1.\u00aa edici\u00f3n - Soluciones iDiscovery","description":"Todo delito inform\u00e1tico deja rastros; solo hay que saber d\u00f3nde buscar. As\u00ed se recopilan y analizan pruebas en una escena de un crimen digital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/publicacion\/informatica-forense\/","og_locale":"es_ES","og_type":"article","og_title":"Computer Forensics: Incident Response Essentials 1st Edition","og_description":"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.","og_url":"https:\/\/idsinc.com\/es\/publicacion\/informatica-forense\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2025-11-26T20:32:13+00:00","og_image":[{"width":1103,"height":1360,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/","url":"https:\/\/idsinc.com\/publication\/computer-forensics\/","name":"Inform\u00e1tica forense: Fundamentos de respuesta a incidentes, 1.\u00aa edici\u00f3n - Soluciones iDiscovery","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","datePublished":"2025-11-26T20:24:35+00:00","dateModified":"2025-11-26T20:32:13+00:00","description":"Todo delito inform\u00e1tico deja rastros; solo hay que saber d\u00f3nde buscar. As\u00ed se recopilan y analizan pruebas en una escena de un crimen digital.","breadcrumb":{"@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/publication\/computer-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","width":1103,"height":1360},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Publications","item":"https:\/\/idsinc.com\/publication\/"},{"@type":"ListItem","position":3,"name":"Computer Forensics: Incident Response Essentials 1st Edition"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"ptb_metabox":[],"ptb_taxonomy":{"category":[{"term_id":23,"name":"Books","slug":"books","term_group":0,"term_taxonomy_id":23,"taxonomy":"category","description":"","parent":20,"count":5,"filter":"raw"},{"term_id":20,"name":"Publications","slug":"publications","term_group":0,"term_taxonomy_id":20,"taxonomy":"category","description":"","parent":0,"count":11,"filter":"raw"}],"publication_category":[{"term_id":28,"name":"All Publications","slug":"all-publications","term_group":0,"term_taxonomy_id":28,"taxonomy":"publication_category","description":"","parent":0,"count":11,"filter":"raw"},{"term_id":25,"name":"Books","slug":"books","term_group":0,"term_taxonomy_id":25,"taxonomy":"publication_category","description":"","parent":0,"count":6,"filter":"raw"}]},"ptb_featured_image":{"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","title":"Inform\u00e1tica forense: Fundamentos de respuesta a incidentes","caption":""},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/publications\/8999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/publications"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/publications"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/7"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/8969"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=8999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=8999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=8999"},{"taxonomy":"publication_category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/publication_category?post=8999"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}