Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 68.
... INTERNET GAMBLING Todd G. Shipley COMPUTER INTRUSIONS Steve Romig 361 375 395 ABOUT THE AUTHORS Curt Bryson spent 11 years in the. APPENDIX 1 APPENDIX 2 APPENDIX 3 APPENDIX 4 APPENDIX 5 AUTHOR INDEX SUBJECT INDEX 415 419 425 433 435 437 ...
... Internet Investigations Course and articles written by him have been published in ISSA's publication, PASSWORD; as ... Internet and Cyberpatterns: Criminal Behavior on the Internet in Criminal Profiling: An Introduction to Behavioral ...
... Internet, Check Point Certified Security Administrator, SANS GIAC Certified Intrusion Analyst, GIAC Certified Unix Security Administrator, and GIAC Certified Incident Handler. Karen is one of the authors and editors of Intrusion ...
... (Internet Protocol) networking protocols and over 10 years of experience designing Internet/ Intranet firewalls and information security solutions. Morrow has written and released several software programs into the public domain. Prior ...
... Internet security response and practices in the Ohio area. Steve received his Bachelor's degree in Math (Computer Science Track) from Carnegie Mellon University in 1983. In years past Steve has worked as lead UNIX system administrator ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |