Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.5. rezultāts no 37.
... bytes that the adverse party is a liar and a cheat. However compelling these scenarios, forensic computing entails more than going after the 'other side's' data. This chapter will examine a different use of forensic computing. The focus ...
... byte of the Evidence File is verified using a 32-bit cyclical redundancy check (CRC), which is generated concurrent to acquisition. Rather than compute a CRC value for the entire disk image, EnCase computes a CRC for every block of 64 ...
... bytes at the beginning of the sector that constitute a unique 'signature' of the file. EnCase will verify the signature of every file it searches against a list of over a thousand known file signatures and associated extensions. If ...
... bytes or flows according to destination TCP port number, or summarize network traffic by source IP address. INCIDENT RESPONSE As we saw with the previous example, flow-filter is an effective tool for pulling interesting traffic out of ...
... bytes. To select a log for review double click on its entry in this window. Review then creates a 'session summary' window for this log (see Figure 4.8). Clicking the refresh button at the top of the log listing window causes review to ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |