Computer Forensics: Computer Crime Scene Investigation, 3/e(Paperback)
暫譯: 電腦取證:電腦犯罪現場調查,第3版(平裝本)

John R. Vacca

  • 出版商: Jones and Bartlett
  • 出版日期: 2022-12-30
  • 售價: $7,040
  • 貴賓價: 9.5$6,688
  • 語言: 英文
  • 頁數: 1200
  • 裝訂: Paperback
  • ISBN: 0763779970
  • ISBN-13: 9780763779979
  • 無法訂購

商品描述

Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and include fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organizationa (TM)s internal computer security specialists with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised systems, ultimately saving the organization the high cost of hiring an outside team of computer forensic investigators. This updated Third Edition includes a comprehensive introduction to computer forensics investigative techniques and provides the knowledge and skills required to conduct a computer forensics investigation from initial discovery to completion. This book also provides the details for an organization's Computer Incident Response Team (CIRT); to collect, manage, and record digital evidence; and to leverage powerful software tools and techniques to uncover hidden or deleted information. Key topics include: Responding to incidents and investigating computer crime, conducting and managing an investigation, performing disk-based analysis, investigating information-hiding techniques, examining e-mail, tracing internet access, searching memory in real-time, and the forensics challenge competition.

商品描述(中文翻譯)

儘管有努力保護敏感數據和網絡,組織仍面臨日益增長的網絡犯罪和安全違規威脅。這些攻擊可能來自內部或外部來源,包括詐騙、版權侵權和數據盜竊。本書《計算機取證與事件響應》為組織內部的計算機安全專家提供了一種合法的方法來處理計算機濫用問題,以及保護敏感數據和識別受損系統的手段,最終幫助組織節省聘請外部計算機取證調查團隊的高昂成本。本書的第三版經過更新,包含了計算機取證調查技術的全面介紹,並提供了從初步發現到完成所需的知識和技能,以進行計算機取證調查。本書還提供了組織的計算機事件響應小組(CIRT)的詳細資訊;以收集、管理和記錄數字證據;並利用強大的軟件工具和技術來揭示隱藏或刪除的信息。主要主題包括:響應事件和調查計算機犯罪、進行和管理調查、執行基於磁碟的分析、調查信息隱藏技術、檢查電子郵件、追蹤互聯網訪問、實時搜索內存,以及取證挑戰競賽。