Hacking Exposed Computer Forensics
McGraw-Hill Professional (Verlag)
978-0-07-225675-8 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Whether retracing the steps of a security breech or tracking down high-tech crime, this complete computer forensics package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in courtGet the needed countermeasures for responding to incidents and advice on how to avoid common dangers from occurring during the forensics process.Use the valuable, up-to-date computer forensics tools on the CD-ROM.
Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics. David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies nationwide.
Part I: Preparing for an IncidentChapter 1: The Forensics Process Chapter 2: Computer Fundamentals Chapter 3: Forensic Lab Environment PreparationPart II: Collecting the EvidenceChapter 4: Forensically Sound Evidence Collection Chapter 5: Remote Investigations and CollectionsPart III: Forensic Investigation TechniquesChapter 6: Microsoft Windows Systems Analysis Chapter 7: Linux AnalysisChapter 8: Macintosh AnalysisChapter 9: Defeating Anti-Forensic TechniquesChapter 10: Enterprise Storage AnalysisChapter 11: E-mail AnalysisChapter 12: Tracking User ActivityChapter 13: Cell Phone and PDA AnalysisPart IV: Presenting Your FindingsChapter 14: Documenting the InvestigationChapter 15: The Justice SystemPart V: AppendixesAppendix A: Forensic Forms and ChecklistsAppendix B: Understanding Legal ConcernsAppendix C: The Digital Evidence Legal ProcessAppendix D: Searching TechniquesAppendix E: The Investigator’s ToolkitGlossary
Reihe/Serie | Hacking Exposed |
---|---|
Zusatzinfo | 100 Illustrations, unspecified |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Recht / Steuern ► Strafrecht | |
Wirtschaft ► Betriebswirtschaft / Management ► Wirtschaftsinformatik | |
Schlagworte | Computerkriminalität • Internet-Security |
ISBN-10 | 0-07-225675-3 / 0072256753 |
ISBN-13 | 978-0-07-225675-8 / 9780072256758 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich