Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 22.
... data-filtering steps would include procedures to accomplish the following: Access or restore evidentiary image files, and restore backup tapes. 1. 2. Generate file lists containing hash values and other information about the files. 3 ...
... hash values, recovers deleted files, and extracts the slack and unassigned clusters. In contrast with the relative ... hash values As soon as the data are verified and available, the consultant should obtain a list of all the files and ...
... hash valuse. GUI tools The consultant can generate detailed file lists with software such as Encase. However, before exporting a file list, the consultant should populate the file property columns with data regarding hash values, file ...
... hash values for the recovered data to use in the data reduction procedure below. Recover slack and unassigned clusters The purpose of extracting slack and unassigned clusters is to capture and prepare any residual text data on the media ...
... hash values. The consultant can either prepare sets of hash values for known files for use in the case or obtain a fairly extensive set of hash values from sources such as the National Drug Intelligence Center (NDIC)32 or the National ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |