Hacking Exposed Computer Forensics, Second Edition : Computer Forensics Secrets & Solutions 🔍
Aaron Philipp, David Cowen, Chris Davis
McGraw-Hill Osborne Media, 2nd ed, Emeryville, Calif., London, 2009], ©2010
英语 [en] · PDF · 10.6MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation
**The latest strategies for investigating cyber-crime**
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. __Hacking Exposed Computer Forensics, Second Edition__ explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
* Effectively uncover, capture, and prepare evidence for investigation
* Store and process collected data in a highly secure digital forensic lab
* Restore deleted documents, partitions, user activities, and file systems
* Analyze evidence gathered from Windows, Linux, and Macintosh systems
* Use the latest Web and client-based e-mail tools to extract relevant artifacts
* Overcome the hacker's anti-forensic, encryption, and obscurity techniques
* Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
* Prepare legal documents that will hold up to judicial and defense scrutiny
**The latest strategies for investigating cyber-crime**
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. __Hacking Exposed Computer Forensics, Second Edition__ explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
* Effectively uncover, capture, and prepare evidence for investigation
* Store and process collected data in a highly secure digital forensic lab
* Restore deleted documents, partitions, user activities, and file systems
* Analyze evidence gathered from Windows, Linux, and Macintosh systems
* Use the latest Web and client-based e-mail tools to extract relevant artifacts
* Overcome the hacker's anti-forensic, encryption, and obscurity techniques
* Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
* Prepare legal documents that will hold up to judicial and defense scrutiny
备用文件名
nexusstc/Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions/db6cba0347a20c5d38996a345cc87c61.pdf
备用文件名
zlib/Computers/Networking/Aaron Philipp, David Cowen, Chris Davis/Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions_738901.pdf
备选作者
Philipp, Aaron, Cowen, David, Davis, Chris
备用出版商
McGraw-Hill/Osborne ; McGraw-Hill [distributor
备用出版商
McGraw-Hill School Education Group
备用出版商
Irwin Professional Publishing
备用出版商
Oracle Press
备用版本
Second Edition, Place of publication not identified, 2010
备用版本
McGraw Hill LLC Professional Division, New York, 2009
备用版本
2nd ed., New York, New York State, 2010
备用版本
United States, United States of America
备用版本
Second Edition, PS, 2009
元数据中的注释
0
元数据中的注释
lg312848
元数据中的注释
{"edition":"2","isbns":["0071626778","9780071626774"],"last_page":544,"publisher":"McGraw-Hill Osborne Media"}
元数据中的注释
Includes index.
备用描述
McGraw Hill - Hacking Exposed Computer Forensics 2nd Edition November 2009 (ATTiCA)......Page 1
Contents......Page 10
Acknowledgments......Page 18
Introduction......Page 20
Part I: Preparing for an Incident......Page 24
Preparing for a Forensics Operation......Page 25
1 The Forensics Process......Page 28
Types of Investigations......Page 29
The Role of the Investigator......Page 32
Elements of a Good Process......Page 35
Defining a Process......Page 38
After the Investigation......Page 41
2 Computer Fundamentals......Page 42
The Bottom-up View of a Computer......Page 43
Types of Media......Page 48
3 Forensic Lab Environment Preparation......Page 64
The Ultimate Computer Forensic Lab......Page 65
Forensic Computers......Page 71
Forensic Hardware and Software Tools......Page 76
The Flyaway Kit......Page 78
Case Management......Page 79
Bonus: Linux or Windows?......Page 82
Part II: Collecting the Evidence......Page 84
Collecting Evidence......Page 85
4 Forensically Sound Evidence Collection......Page 86
Collecting Evidence from a Single System......Page 87
Common Mistakes in Evidence Collection......Page 117
5 Remote Investigations and Collections......Page 120
Privacy Issues......Page 121
Remote Investigations......Page 122
Remote Collections......Page 135
Encrypted Volumes or Drives......Page 145
USB Thumb Drives......Page 148
Part III: Forensic Investigation Techniques......Page 150
We're Not Done. Yet.......Page 151
Finally......Page 152
6 Microsoft Windows Systems Analysis......Page 154
Windows File Systems......Page 155
Recovering Deleted Files......Page 161
Windows Artifacts......Page 173
7 Linux Analysis......Page 184
The Linux File System (ext2 and ext3)......Page 185
Linux Analysis......Page 189
8 Macintosh Analysis......Page 198
The Evolution of the Mac OS......Page 199
Looking at a Mac Disk or Image......Page 201
Deleted Files......Page 209
A Closer Look at Macintosh Files......Page 215
Mac as a Forensics Platform......Page 218
9 Defeating Anti-forensic Techniques......Page 220
Obscurity Methods......Page 221
Privacy Measures......Page 228
10 Enterprise Storage Analysis......Page 244
The Enterprise Data Universe......Page 245
Working with NAS Systems......Page 247
Working with SAN Systems......Page 248
Working with Tapes......Page 249
Full-Text Indexing......Page 254
Mail Servers......Page 257
11 E-mail Analysis......Page 262
Finding E-mail Artifacts......Page 263
Obtaining Web-based E-mail (Webmail) from Online Sources......Page 264
Client-based E-mail......Page 266
Web-Based E-mail......Page 284
Investigating E-mail Headers......Page 290
12 Tracking User Activity......Page 296
Microsoft Office Forensics......Page 297
Tracking Web Usage......Page 306
Operating System User Logs......Page 321
13 Forensic Analysis of Mobile Devices......Page 326
Collecting and Analyzing Mobile Device Evidence......Page 328
Password-protected Windows Devices......Page 354
Conclusion......Page 361
Part IV: Presenting Your Findings......Page 362
He Said, She Said.........Page 363
14 Documenting the Investigation......Page 364
Read Me......Page 365
Internal Report......Page 366
Declaration......Page 369
Affidavit......Page 373
Expert Report......Page 374
15 The Justice System......Page 380
The Criminal Court System......Page 381
The Civil Justice System......Page 382
Expert Status......Page 387
Part V: Putting It All Together......Page 390
Time to Understand the Business Issues......Page 391
16 IP Theft......Page 392
What Is IP Theft?......Page 393
IP Theft Ramifications......Page 394
Types of Theft......Page 396
Tying It Together......Page 412
17 Employee Misconduct......Page 416
What Is Employee Misconduct?......Page 417
Ramifications......Page 418
Types of Misconduct......Page 421
Tying It Together......Page 435
18 Employee Fraud......Page 440
What Is Employee Fraud?......Page 441
Ramifications......Page 442
Types of Employee Fraud......Page 443
Tying It Together......Page 455
19 Corporate Fraud......Page 458
Ramifications......Page 460
Types of Corporate Fraud......Page 462
20 Organized Cyber Crime......Page 476
The Changing Landscape of Hacking......Page 477
Types of Hacks and the Role of Computer Forensics......Page 480
Money Laundering......Page 488
21 Consumer Fraud......Page 494
Ramifications......Page 496
Types of Consumer Fraud......Page 498
Tying It Together......Page 514
A Searching Techniques......Page 516
Regular Expressions......Page 517
V......Page 0
Z......Page 521
Contents......Page 10
Acknowledgments......Page 18
Introduction......Page 20
Part I: Preparing for an Incident......Page 24
Preparing for a Forensics Operation......Page 25
1 The Forensics Process......Page 28
Types of Investigations......Page 29
The Role of the Investigator......Page 32
Elements of a Good Process......Page 35
Defining a Process......Page 38
After the Investigation......Page 41
2 Computer Fundamentals......Page 42
The Bottom-up View of a Computer......Page 43
Types of Media......Page 48
3 Forensic Lab Environment Preparation......Page 64
The Ultimate Computer Forensic Lab......Page 65
Forensic Computers......Page 71
Forensic Hardware and Software Tools......Page 76
The Flyaway Kit......Page 78
Case Management......Page 79
Bonus: Linux or Windows?......Page 82
Part II: Collecting the Evidence......Page 84
Collecting Evidence......Page 85
4 Forensically Sound Evidence Collection......Page 86
Collecting Evidence from a Single System......Page 87
Common Mistakes in Evidence Collection......Page 117
5 Remote Investigations and Collections......Page 120
Privacy Issues......Page 121
Remote Investigations......Page 122
Remote Collections......Page 135
Encrypted Volumes or Drives......Page 145
USB Thumb Drives......Page 148
Part III: Forensic Investigation Techniques......Page 150
We're Not Done. Yet.......Page 151
Finally......Page 152
6 Microsoft Windows Systems Analysis......Page 154
Windows File Systems......Page 155
Recovering Deleted Files......Page 161
Windows Artifacts......Page 173
7 Linux Analysis......Page 184
The Linux File System (ext2 and ext3)......Page 185
Linux Analysis......Page 189
8 Macintosh Analysis......Page 198
The Evolution of the Mac OS......Page 199
Looking at a Mac Disk or Image......Page 201
Deleted Files......Page 209
A Closer Look at Macintosh Files......Page 215
Mac as a Forensics Platform......Page 218
9 Defeating Anti-forensic Techniques......Page 220
Obscurity Methods......Page 221
Privacy Measures......Page 228
10 Enterprise Storage Analysis......Page 244
The Enterprise Data Universe......Page 245
Working with NAS Systems......Page 247
Working with SAN Systems......Page 248
Working with Tapes......Page 249
Full-Text Indexing......Page 254
Mail Servers......Page 257
11 E-mail Analysis......Page 262
Finding E-mail Artifacts......Page 263
Obtaining Web-based E-mail (Webmail) from Online Sources......Page 264
Client-based E-mail......Page 266
Web-Based E-mail......Page 284
Investigating E-mail Headers......Page 290
12 Tracking User Activity......Page 296
Microsoft Office Forensics......Page 297
Tracking Web Usage......Page 306
Operating System User Logs......Page 321
13 Forensic Analysis of Mobile Devices......Page 326
Collecting and Analyzing Mobile Device Evidence......Page 328
Password-protected Windows Devices......Page 354
Conclusion......Page 361
Part IV: Presenting Your Findings......Page 362
He Said, She Said.........Page 363
14 Documenting the Investigation......Page 364
Read Me......Page 365
Internal Report......Page 366
Declaration......Page 369
Affidavit......Page 373
Expert Report......Page 374
15 The Justice System......Page 380
The Criminal Court System......Page 381
The Civil Justice System......Page 382
Expert Status......Page 387
Part V: Putting It All Together......Page 390
Time to Understand the Business Issues......Page 391
16 IP Theft......Page 392
What Is IP Theft?......Page 393
IP Theft Ramifications......Page 394
Types of Theft......Page 396
Tying It Together......Page 412
17 Employee Misconduct......Page 416
What Is Employee Misconduct?......Page 417
Ramifications......Page 418
Types of Misconduct......Page 421
Tying It Together......Page 435
18 Employee Fraud......Page 440
What Is Employee Fraud?......Page 441
Ramifications......Page 442
Types of Employee Fraud......Page 443
Tying It Together......Page 455
19 Corporate Fraud......Page 458
Ramifications......Page 460
Types of Corporate Fraud......Page 462
20 Organized Cyber Crime......Page 476
The Changing Landscape of Hacking......Page 477
Types of Hacks and the Role of Computer Forensics......Page 480
Money Laundering......Page 488
21 Consumer Fraud......Page 494
Ramifications......Page 496
Types of Consumer Fraud......Page 498
Tying It Together......Page 514
A Searching Techniques......Page 516
Regular Expressions......Page 517
V......Page 0
Z......Page 521
备用描述
Publisher's Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
备用描述
I use this text as the required text for a course I teach on Computer Forensics. Overall, it is an excellent introductory text. Students say that it is easy to read, which is exactly what I want in a textbook. However, I do not use it exclusively for lecture material. I pull my lecture material from a variety of texts, such as Real Digital Forensics, Incident Response (2nd edition), File System Forensic Analysis, and the other Hacking Exposed Textbooks.
The second edition is a welcome improvement. I really like the new section (Part V) where it discusses the practical cases, and what type of forensic techniques that you would use for each type of case.
I create all of my own lectures and labs for the classroom. I assign this text to students to fill in the gaps of the lectures.
备用描述
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.
备用描述
Leading experts in computer forensics reveal the secrets and strategies for investigating computer crime, in an updated edition that includes six new chapters that cover IP theft, employee misconduct, securities fraud, embezzlement, organized crime and hacking, and foreign corrupt practices and money laundering. Original.
备用描述
With case studies straight from today's headlines; this reall-world resource explains how to construct a high-tech forensic lab; collect prosecutable evidence; discover e-mail and system file clues; track wireless activity; and recover obscured documents. -- Edited summary from book
开源日期
2010-10-03
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.