Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 80.
... server network using different technology, not only do the old file formats become incompatible with the new applications, but often the new hardware cannot read the old media. While this issue may not interfere with the day-to-day ...
... server. 24 For example, with only copies of files to review, the only evidence that someone might have that someone deleted files using a program such as Norton's wipeinfo would be the absence of files. On the other hand, were one to ...
... server contains the e-mail databases. If a server contains multiple hard drives, the expert will need to determine which hard drives to copy or whether to copy all of the hard drives. Simple logistics also requires the producing party's ...
... server's monthly backup tapes for the past year. Her next task is to pass the accumulated data to the attorney for her review. Prudently, she asks the attorney if she has any preference on the form of the records. Of course, the ...
... server's monthly backup tapes for the last year. Her next task is to organize the accumulated data and give them to the attorney to review. Prudently, she consults with the attorney. She explains how she can safely eliminate a large ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |