Cyber Crime Investigator's Field Guide
Seiten
2005
|
2nd edition
Auerbach (Verlag)
978-0-8493-2768-1 (ISBN)
Auerbach (Verlag)
978-0-8493-2768-1 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. This title provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.
This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.
This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.
The initial contact. Client site arrival. Evidence collection procedures. Evidence collection and analysis tools. AccessData's Forensic Tool Kit. Guidance Software's EnCase. Ilook Investigator. Password recovery. Questions and answers by subject area. Recommended reference materials. Case study.
Erscheint lt. Verlag | 25.1.2005 |
---|---|
Zusatzinfo | 10 Tables, black and white; 66 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 566 g |
Themenwelt | Recht / Steuern ► Strafrecht ► Kriminologie |
ISBN-10 | 0-8493-2768-7 / 0849327687 |
ISBN-13 | 978-0-8493-2768-1 / 9780849327681 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
wie wir unsere Mimik und verborgene Körpersignale entschlüsseln
Buch | Hardcover (2022)
Droemer (Verlag)
20,00 €