Incident Response and Computer Forensics, 2/e (Paperback)
暫譯: 事件響應與電腦取證(第二版)
Chris Prosise, Kevin Mandia, Matt Pepe
- 出版商: McGraw-Hill Education
- 出版日期: 2003-07-17
- 售價: $2,220
- 貴賓價: 9.5 折 $2,109
- 語言: 英文
- 頁數: 507
- 裝訂: Paperback
- ISBN: 007222696X
- ISBN-13: 9780072226966
已過版
買這商品的人也買了...
-
$980$774 -
$1,930$1,834 -
$690$587 -
$750$638 -
$760$600 -
$590$466 -
$750$585 -
$1,780$1,691 -
$680$537 -
$1,590$1,511 -
$690$538 -
$720$562 -
$720$569 -
$640$544 -
$750$638 -
$560$476 -
$2,390$2,271 -
$480$379 -
$780$616 -
$490$382 -
$720$612 -
$5,220$4,959 -
$420$332 -
$700$630 -
$480$408
商品描述
Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
An insiders look at the legal, procedural and technical steps of computer forensics and analysis. --Information Security magazine
This book is an absolute must-read for anyone who plays a role in responding to computer security events. --Marc J. Zwillinger, former trial attorney with the U.S. Dept. of Justice, Computer Crime & Intellectual Property
An excellent resource for information on how to respond to computer intrusions and conduct forensic investigations. --Network Magazine
If your job requires you to review the contents of a computer system for evidence of unauthorized or unlawful activities, this is the book for you. The authors, through real-world experiences, demonstrate both technically and procedurally the right way to perform computer forensics and respond to security incidents. --Howard A. Schmidt, Former Special Advisor for Cyber Security, White House, and former Chief Security Officer, Microsoft Corp.
New and Updated Material:
- New real-world scenarios throughout
- The latest methods for collecting live data and investigating Windows and
UNIX systems
- Updated information on forensic duplication
- New chapter on emergency network security monitoring
- New chapter on corporate evidence handling procedures
- New chapter on data preparation with details on hard drive interfaces and
data storage principles
- New chapter on data extraction and analysis
- The latest techniques for analyzing network traffic
- Up-to-date methods for investigating and assessing hacker tools
Foreword by former FBI Special Agent Scott Larson
Contents
Part I: Overview
Ch. 1: Case
Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response
Part II: Data Collection
Ch. 4: Data
Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7:
Network Traffic Collection
Ch. 8: Data Collection from
Other Sources
Ch. 9: Evidence Handling
Part III: Forensic Analysis
Ch. 10:
Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows
Systems
Ch. 13: Unix
Part IV:
Analysis of Other Evidence
Ch. 14: Investigation of
Routers
Ch. 15: Investigation of Web Servers
Ch. 16: Investigation of Application Servers
Ch. 17: Analysis of Network
Traces
Ch. 18: Investigating Hacker Tools
Part V: Remediation
Ch. 19: Reporting
and Documentation
Ch. 20: Developing an Incident
Response Plan
Ch. 21: Establishing Identify in
Cyberspace
Ch. 22: Data
Recovery
商品描述(中文翻譯)
完全更新最新技術——包含全新的取證內容和真實世界情境
對於電腦取證和分析的法律、程序和技術步驟的內部觀察。——《資訊安全》雜誌
這本書是任何參與應對電腦安全事件的人必讀的書籍。——馬克·J·茲威林格(Marc J. Zwillinger),美國司法部計算機犯罪與智慧財產部前審判律師
這是一本關於如何應對電腦入侵和進行取證調查的優秀資源。——《網路雜誌》
如果您的工作需要您檢查計算機系統的內容,以尋找未經授權或非法活動的證據,那麼這本書就是為您而寫的。作者通過真實的經驗,技術性和程序性地展示了正確執行電腦取證和應對安全事件的方法。——霍華德·A·施密特(Howard A. Schmidt),前白宮網路安全特別顧問,前微軟公司首席安全官
新更新的內容:
- 新的真實世界情境
- 收集即時數據和調查Windows及UNIX系統的最新方法
- 更新的取證複製資訊
- 新章節:緊急網路安全監控
- 新章節:企業證據處理程序
- 新章節:數據準備,詳細介紹硬碟介面和數據存儲原則
- 新章節:數據提取和分析
- 分析網路流量的最新技術
- 調查和評估駭客工具的最新方法
前言由前FBI特工斯科特·拉爾森(Scott Larson)撰寫
目錄
第一部分:概述
第1章:案例研究
第2章:事件響應過程
第3章:準備事件響應
第二部分:數據收集
第4章:從Windows收集數據
第5章:從Unix收集數據
第6章:取證複製
第7章:網路流量收集
第8章:從其他來源收集數據
第9章:證據處理
第三部分:取證分析
第10章:物理分析
第11章:數據分析
第12章:Windows系統分析
第13章:Unix
第四部分:其他證據的分析
第14章:路由器調查
第15章:網頁伺服器調查
第16章:應用伺服器調查
第17章:網路痕跡分析
第18章:調查駭客工具
第五部分:修復
第19章:報告和文檔
第20章:制定事件響應計劃
第21章:在網路空間中建立身份
第22章:數據恢復