Hacking Exposed Computer Forensics - Chris Davis, Aaron Philipp, David Cowen

Hacking Exposed Computer Forensics

Buch | Softcover
480 Seiten
2004
McGraw-Hill Professional (Verlag)
978-0-07-225675-8 (ISBN)
32,95 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Whether retracing the steps of a security breech or tracking down high-tech crime, this computer forensics package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in court. It provides advice on how to avoid common dangers from occurring during the forensics process.
Whether retracing the steps of a security breech or tracking down high-tech crime, this complete computer forensics package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in courtGet the needed countermeasures for responding to incidents and advice on how to avoid common dangers from occurring during the forensics process.Use the valuable, up-to-date computer forensics tools on the CD-ROM.

Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics. David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies nationwide.

Part I: Preparing for an IncidentChapter 1: The Forensics Process Chapter 2: Computer Fundamentals Chapter 3: Forensic Lab Environment PreparationPart II: Collecting the EvidenceChapter 4: Forensically Sound Evidence Collection Chapter 5: Remote Investigations and CollectionsPart III: Forensic Investigation TechniquesChapter 6: Microsoft Windows Systems Analysis Chapter 7: Linux AnalysisChapter 8: Macintosh AnalysisChapter 9: Defeating Anti-Forensic TechniquesChapter 10: Enterprise Storage AnalysisChapter 11: E-mail AnalysisChapter 12: Tracking User ActivityChapter 13: Cell Phone and PDA AnalysisPart IV: Presenting Your FindingsChapter 14: Documenting the InvestigationChapter 15: The Justice SystemPart V: AppendixesAppendix A: Forensic Forms and ChecklistsAppendix B: Understanding Legal ConcernsAppendix C: The Digital Evidence Legal ProcessAppendix D: Searching TechniquesAppendix E: The Investigator’s ToolkitGlossary

Reihe/Serie Hacking Exposed
Zusatzinfo 100 Illustrations, unspecified
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Recht / Steuern Strafrecht
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
Schlagworte Computerkriminalität • Internet-Security
ISBN-10 0-07-225675-3 / 0072256753
ISBN-13 978-0-07-225675-8 / 9780072256758
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95