Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 93.
... data logically using the Palm OS or Palm Desktop enables the examiner to determine which data were stored in the Memo application and the category in which they were stored. Take the Linux operating system as another example. When ...
... file 'internals' of the change order shows no sign of tampering. On the other hand, the only available copy of the owner's file shows time and date stamps of when the IT staff did its review. Worse, review of the file internals of the ...
... data recovery purposes, the producing party should make either an exact bit for bit copy of each medium to another like medium (an 'evidentiary duplicate'), or create a bit for bit image of the original media in one or more files (an ...
... files, allows the producing party the flexibility to delve into facts and details the files themselves cannot disclose. Case law supports the preference for collecting, or copying, data in a manner that best preserves all the data on ...
... data, convert files to a readable format, decrypt encrypted files, or perform other processing. Since most attorneys are ill prepared to handle a massive dump of files from evidentiary images or backup tapes, the consultant can ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |