Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 47.
... log files may only be retained for a few days. Furthermore, if they have the skill and opportunity, criminals will destroy or modify evidence to protect themselves. A third contributing factor is the wide range of technical expertise ...
... files not excluded by data reduction. Processing has not altered these files. □ \rslack All data from slack ... log to determine if any files could not be indexed and why. The attorneys can begin their review as soon as the indexes are ...
... file list will serve as the production log. The producing party generally has to provide the other parties with a 'privilege log' that lists all the records withheld from production and describes the legal basis for withholding them.37 ...
... files with the File Transfer Protocol (FTP), and played a game or two of Quake. The packets for all of these network activities would be intermingled in a single log file. To make sense of these logs one would first have to list all of ...
... log files using the mouse to select log files or sessions within the log. Review allows the examiner to filter and reform the contents of the packets logged according to user-defined parameters, and also supports protocol specific ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |