Hacking Exposed Computer Forensics, Second Edition : Computer Forensics Secrets & Solutions 🔍
Aaron Philipp; David Cowen; Chris Davis McGraw-Hill/Osborne ; McGraw-Hill [distributor, McGraw Hill LLC Professional Division, New York, 2009
英语 [en] · PDF · 30.5MB · 2009 · 📗 未知类型的图书 · 🚀/ia · Save
描述
'Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies....Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations.'--Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny
备选作者
Philipp, Aaron; Cowen, David; Davis, Chris, CISSP
备用出版商
McGraw-Hill School Education Group
备用出版商
Irwin Professional Publishing
备用出版商
New York: McGraw-Hill
备用出版商
Oracle Press
备用版本
Second Edition, Place of publication not identified, 2010
备用版本
2nd ed, Emeryville, Calif., London, 2009], ©2010
备用版本
2nd ed., New York, New York State, 2010
备用版本
United States, United States of America
备用版本
Second edition, New York, 2010
备用版本
Second Edition, PS, 2009
元数据中的注释
Cut-off text on some pages due to tight binding.
元数据中的注释
Includes index.
备用描述
xxiv, 518 p. : 24 cm
Previous ed. had Davis as first author
Includes index
Pt. I. Preparing for an Incident -- 1. The Forensics Process -- 2. Computer Fundamentals -- 3. Forensic Lab Environment Preparation -- Pt. II. Collecting the Evidence -- 4. Forensically Sound Evidence Collection -- 5. Remote Investigations and Collections -- Pt. III. Forensic Investigation Techniques -- 6. Microsoft Windows Systems Analysis -- 7. Linux Analysis -- 8. Macintosh Analysis -- 9. Defeating Anti-forensic Techniques -- 10. Enterprise Storage Analysis -- 11. E-mail Analysis -- 12. Tracking User Activity -- 13. Forensic Analysis of Mobile Devices -- Pt. IV. Presenting Your Findings -- 14. Documenting the Investigation -- 15. The Justice System -- Pt. V. Putting it all Together -- 16. IP Theft -- 17. Employee Misconduct -- 18. Employee Fraud -- 19. Corporate Fraud -- 20. Organized Cyber Crime -- 21. Consumer Fraud -- A. Searching Techniques
备用描述
Publisher's Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
备用描述
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.
备用描述
Leading experts in computer forensics reveal the secrets and strategies for investigating computer crime, in an updated edition that includes six new chapters that cover IP theft, employee misconduct, securities fraud, embezzlement, organized crime and hacking, and foreign corrupt practices and money laundering. Original.
备用描述
With case studies straight from today's headlines; this reall-world resource explains how to construct a high-tech forensic lab; collect prosecutable evidence; discover e-mail and system file clues; track wireless activity; and recover obscured documents. -- Edited summary from book
开源日期
2024-07-01
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。