Real Digital Forensics: Computer Security and Incident Response
暫譯: 真實數位取證:電腦安全與事件回應
Keith J. Jones, Richard Bejtlich, Curtis W. Rose
- 出版商: Addison Wesley
- 出版日期: 2005-09-01
- 定價: $2,640
- 售價: 9.0 折 $2,376
- 語言: 英文
- 頁數: 688
- 裝訂: Paperback
- ISBN: 0321240693
- ISBN-13: 9780321240699
-
相關分類:
資訊安全
立即出貨(限量)
買這商品的人也買了...
-
$2,640$2,508 -
$1,200$1,176 -
$490$382 -
$490$382 -
$1,980The Tao Of Network Security Monitoring: Beyond Intrusion Detection
-
$650$507 -
$550$468 -
$650$553 -
$580$493 -
$880$695 -
$680$449 -
$360$360 -
$490$417 -
$580$493 -
$390$332 -
$180$142 -
$650$507 -
$890$757 -
$780$741 -
$450$383 -
$780$663 -
$680$578 -
$580$493 -
$650$507 -
$480$408
相關主題
商品描述
Table of Contents:
Preface.
Acknowledgments.
About the Authors.
Case Studies.
I. LIVE INCIDENT RESPONSE.
1. Windows Live Response.
2. Unix Live Response.
II. NETWORK-BASED FORENSICS.
3. Collecting Network-Based Evidence.
4. Analyzing Network-Based Evidence for a Windows Intrusion.
5. Analyzing Network-Based Evidence for a Unix Intrusion.
III. ACQUIRING A FORENSIC DUPLICATION.
6. Before You Jump Right In…
7. Commercial-Based Forensic Duplications.
8. Noncommercial-Based Forensic Duplications.
IV. FORENSIC ANALYSIS TECHNIQUES.
9. Common Forensic Analysis Techniques.
10. Web Browsing Activity Reconstruction.
11. E-Mail Activity Reconstruction.
12. Microsoft Windows Registry Reconstruction.
13. Forensic Tool Analysis: An Introduction to Using Linux for Analyzing Files of Unknown Origin.
14. Forensic Tool Analysis: A Hands-On Analysis of the Linux File aio.
15. Forensic Tool Analysis: Analyzing Files of Unknown Origin (Windows).
V. CREATING A COMPLETE FORENSIC TOOL KIT.
16. Building the Ultimate Response CD.
17. Making Your CD-ROM a Bootable Environment.
VI. MOBILE DEVICE FORENSICS.
18. Forensic Duplication and Analysis of Personal Digital Assistants.
19. Forensic Duplication of USB and Compact Flash Memory Devices.
20. Forensic Analysis of USB and Compact Flash Memory Devices.
VII. ONELINE-BASED FORENSCIS.
21. Tracing E-Mail.
22. Domain Name Ownership.
Appendix: An Introduction to Perl.
Index.
商品描述(中文翻譯)
目錄:
前言
致謝
關於作者
案例研究
I. 實時事件響應
1. Windows 實時響應
2. Unix 實時響應
II. 基於網路的取證
3. 收集基於網路的證據
4. 分析 Windows 入侵的基於網路的證據
5. 分析 Unix 入侵的基於網路的證據
III. 獲取取證複製
6. 在您直接進入之前...
7. 商業取證複製
8. 非商業取證複製
IV. 取證分析技術
9. 常見的取證分析技術
10. 網頁瀏覽活動重建
11. 電子郵件活動重建
12. Microsoft Windows 註冊表重建
13. 取證工具分析:使用 Linux 分析未知來源檔案的入門
14. 取證工具分析:Linux 檔案 aio 的實作分析
15. 取證工具分析:分析未知來源檔案(Windows)
V. 創建完整的取證工具包
16. 建立終極響應 CD
17. 使您的 CD-ROM 成為可啟動環境
VI. 行動裝置取證
18. 個人數位助理的取證複製與分析
19. USB 和 Compact Flash 記憶體裝置的取證複製
20. USB 和 Compact Flash 記憶體裝置的取證分析
VII. 在線取證
21. 追蹤電子郵件
22. 網域名稱所有權
附錄:Perl 簡介
索引