Hacking Exposed Computer Forensics, 2/e: Computer Forensics Secrets & Solutions (Paperback) (駭客揭密:電腦取證秘訣與解決方案(第二版))
Aaron Philipp, David Cowen, Chris Davis
- 出版商: McGraw-Hill Education
- 出版日期: 2009-10-01
- 定價: $1,500
- 售價: 5.0 折 $750
- 語言: 英文
- 頁數: 544
- 裝訂: Paperback
- ISBN: 0071626778
- ISBN-13: 9780071626774
-
相關分類:
駭客 Hack
立即出貨
買這商品的人也買了...
-
$872Machine Vision
-
$780$741 -
$980$774 -
$650$553 -
$980$774 -
$530$451 -
$650$514 -
$680$537 -
$530$199 -
$420$328 -
$750$593 -
$520$411 -
$820$648 -
$580$493 -
$620$484 -
$490$417 -
$520$416 -
$2,010$1,910 -
$450$351 -
$420$332 -
$450$383 -
$620$484 -
$600$510 -
$950$751 -
$850$672
相關主題
商品描述
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation
The latest strategies for investigating cyber-crime
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
- Effectively uncover, capture, and prepare evidence for investigation
- Store and process collected data in a highly secure digital forensic lab
- Restore deleted documents, partitions, user activities, and file systems
- Analyze evidence gathered from Windows, Linux, and Macintosh systems
- Use the latest Web and client-based e-mail tools to extract relevant artifacts
- Overcome the hacker's anti-forensic, encryption, and obscurity techniques
- Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
- Prepare legal documents that will hold up to judicial and defense scrutiny
商品描述(中文翻譯)
「以直接、資訊豐富的方式提供實用的操作知識,並透過實際案例將複雜的元素串聯起來。......提供市場上最有價值的洞察力。作者直截了當地解釋了人們在有效進行電腦取證調查時必須理解的要點。」——Brian H. Karney,AccessData Corporation 首席運營官
「調查網絡犯罪的最新策略」
這本全新更新的實用資源將幫助您辨識和調查各種類型的電腦犯罪分子。《Hacking Exposed Computer Forensics, Second Edition》解釋了如何建立一個高科技的取證實驗室,收集可提供作為證據的證據,發現電子郵件和系統文件的線索,追蹤無線活動,並恢復被隱藏的文件。學習如何重現攻擊者的腳步,與律師溝通,準備適用於法庭的報告,並應對法律和組織上的挑戰。案例研究直接來自當今的新聞頭條,涵蓋了知識產權盜竊、抵押詐騙、員工不當行為、證券詐騙、侵吞公款、有組織犯罪和消費者詐騙案件。
- 有效地發現、收集和準備調查證據
- 在高度安全的數位取證實驗室中存儲和處理收集到的數據
- 恢復已刪除的文件、分區、用戶活動和文件系統
- 分析從Windows、Linux和Macintosh系統中收集到的證據
- 使用最新的網絡和基於客戶端的電子郵件工具提取相關證據
- 克服黑客的反取證、加密和模糊技術
- 解鎖存儲在手機、個人數據助理和Windows Mobile設備中的線索
- 準備能夠經受司法和辯護檢驗的法律文件」