Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 73.
... command may also be written to a file on the EABD: fdisk/status > a:\status.) Load the imaging software. If the imaging software prompts for case information, provide the information set out on the evidence tag, as appropriate. When ...
... commands for date ('date') and time ('time') and note on the evidence tag the date and time represented by the computer and the actual date and time. Consider making two images of each hard drive, using a different imaging application ...
... command line utilities (Command Line). The consultant can perform many of these procedures using the software discussed elsewhere in this book, although many of the examples below use programs from the Maresware Forensic Processing ...
... Command line Restoring hard drives from evidentiary images is also fairly straightforward. Forensic imaging software, such as Safeback, will verify the restoration as it writes the data to the restore medium. After restoring an ...
... Command line Using Maresware utilities and other command line utilities, either one at a time or in batch files, the consultant can quickly generate detailed file lists. The consultant can use the same commands with these utilities ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |