Computer Forensics Incident Response Essential (Paperback)
暫譯: 電腦取證事件響應要素 (平裝本)

Warren G. Kruse II, Jay G. Heiser

買這商品的人也買了...

相關主題

商品描述

Written by two experts in digital investigation, Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the student through the complete forensics process蕞瞞rom the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered.

Table of Contents

Preface.
Acknowledgments.
1. Introduction to Computer Forensics.
2. Tracking an Offender.
3. The Basics of Hard Drives and Storage.
4. Encryption and Forensics.
5. Data Hiding.
6. Hostile Code.
7. Your Electronic Toolkit.
8. Investigating Windows Computers.
9. Introduction to Unix for Forensic Examiners.
10. Compromising a Unix Host.
11. Investigating a Unix Host.
12. Introduction to the Criminal Justice System.
13. Conclusion.
Appendix A. Internet Data Center Response Plan.
Appendix B. Incident Response Triage Questionnaire.
Appendix C. How to Become a Unix Guru.
Appendix D. Exporting a Windows 2000 Personal Certificate.
Appendix E. How to Crowbar Unix Hosts.
Appendix F. Creating a Linux Boot CD.
Appendix G. Contents of a Forensic CD.
Annotated Bibliography.

商品描述(中文翻譯)

由兩位數位調查專家撰寫的《電腦取證》提供了如何將電腦作為證據處理的廣泛資訊。Kruse 和 Heiser 帶領讀者了解完整的取證過程,從初步的證據收集到最終報告。主題包括加密的取證相關性概述、數位證據的線索檢查,以及在法庭上最有效地呈現證據和結論的方法。與 Unix 和 Windows NT/2000 作業系統相關的獨特取證問題也得到了全面的探討。

目錄
前言
致謝
1. 電腦取證簡介
2. 追蹤犯罪者
3. 硬碟和儲存的基本知識
4. 加密與取證
5. 數據隱藏
6. 惡意程式碼
7. 你的電子工具箱
8. 調查 Windows 電腦
9. 為取證檢查員介紹 Unix
10. 侵入 Unix 主機
11. 調查 Unix 主機
12. 刑事司法系統簡介
13. 結論
附錄 A. 網際網路數據中心應變計畫
附錄 B. 事件應變分流問卷
附錄 C. 如何成為 Unix 大師
附錄 D. 匯出 Windows 2000 個人憑證
附錄 E. 如何入侵 Unix 主機
附錄 F. 創建 Linux 開機 CD
附錄 G. 取證 CD 的內容
註釋書目