Hacking Exposed Computer Forensics (Paperback)
Chris Davis, Aaron Philipp, David Cowen
- 出版商: McGraw-Hill Education
- 出版日期: 2004-11-22
- 定價: $1,500
- 售價: 2.7 折 $399
- 語言: 英文
- 頁數: 480
- 裝訂: Paperback
- ISBN: 0072256753
- ISBN-13: 9780072256758
-
相關分類:
駭客 Hack
立即出貨(限量) (庫存=3)
買這商品的人也買了...
-
$980$774 -
$1,490$1,416 -
$880$695 -
$590$466 -
$2,640$2,508 -
$560$504 -
$1,530$1,454 -
$299$254 -
$450$383 -
$490$417 -
$620$490 -
$902Computer Science Illuminated, 2/e
-
$380$300 -
$480$408 -
$650$507 -
$450$405 -
$1,485Forensic Discovery (Hardcover)
-
$199$179 -
$2,000$1,900 -
$580$452 -
$1,176Wireless Communications & Networks, 2/e (美國版ISBN:0131918354)
-
$620$527 -
$880$748 -
$880$581 -
$650$507
相關主題
商品描述
Description:
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You’ll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It’s all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you’ll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.
Table of Contents:
Part I: Preparing for an Incident
Chapter 1: The Forensics Process
Chapter 2: Computer Fundamentals
Chapter 3: Forensic Lab Environment Preparation
Part II: Collecting the Evidence
Chapter 4: Forensically Sound Evidence Collection
Chapter 5: Remote Investigations and Collections
Part III: Forensic Investigation Techniques
Chapter 6: Microsoft Windows Systems Analysis
Chapter 7: Linux Analysis
Chapter 8: Macintosh Analysis
Chapter 9: Defeating Anti-Forensic Techniques
Chapter 10: Enterprise Storage Analysis
Chapter 11: E-mail Analysis
Chapter 12: Tracking User Activity
Chapter 13: Cell Phone and PDA Analysis
Part IV: Presenting Your Findings
Chapter 14: Documenting the Investigation
Chapter 15: The Justice System
Part V: Appendixes
Appendix A: Forensic Forms and Checklists
Appendix B: Understanding Legal Concerns
Appendix C: The Digital Evidence Legal Process
Appendix D: Searching Techniques
Appendix E: The Investigator’s Toolkit
Glossary
商品描述(中文翻譯)
描述:
快速且有效地調查電腦犯罪、企業不法行為和駭客入侵,這本實用且全面的資源將提供您專家級的資訊,以成功起訴違法者,同時避免非法搜查、侵犯隱私和非法獲取證據的陷阱。這裡包含了所有必要的程序,從收集可行的證據、重建犯罪時間軸、追蹤嫌疑人,到揭示被隱藏和刪除的程式碼、解鎖加密文件和準備合法的宣誓書。此外,還深入介紹了最新的個人數位助理和手機調查技術,並提供實際案例研究。
目錄:
第一部分:準備事件
第1章:鑑識程序
第2章:電腦基礎知識
第3章:鑑識實驗室環境準備
第二部分:收集證據
第4章:合法的證據收集
第5章:遠程調查和收集
第三部分:鑑識調查技術
第6章:Microsoft Windows系統分析
第7章:Linux分析
第8章:Macintosh分析
第9章:打敗反鑑識技術
第10章:企業存儲分析
第11章:電子郵件分析
第12章:追蹤使用者活動
第13章:手機和個人數位助理分析
第四部分:呈現調查結果
第14章:記錄調查
第15章:司法體系
附錄:
附錄A:鑑識表格和檢查清單
附錄B:了解法律問題
附錄C:數位證據法律程序
附錄D:搜尋技巧
附錄E:調查人員工具包
詞彙表