Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 34.
... attacks and their actions may relocate evidence, obliterate patterns, cause transfers, and add artefact-evidence to the scene. □ Forensic examiners: the expert examiner of a system may, by accident or necessity, change, relocate ...
... Attacks and Countermeasures, Kluwer Academic Publishers (additional resources available online at http://www.jjtc.com/Steganography/). McClintock, D. (2001) Fatal Bondage, Vanity Fair, June. MSNBC (2001)Judge OKs FBI hack of Russian ...
... ATTACK Early in the afternoon of July 2, 1999 we were alerted to slow network services on campus. It did not take long to find that the inbound portion of our connection to our ISP was full. Running the most recent flow logs through ...
... attack. Disabling the host with a black-hole route prompted the attackers to end the attack shortly after. Unfortunately the Smurf attack was only a precursor to the activity that followed later that day. Shortly after one of the ...
... attack a victim. SUMMARY The OSU flow-tools package also provides programs to perform statistical analysis of the contents of the logs, aggregate data from flows by department, detect intrusion attempts and other unusual activity, and ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |