Incident Response: Computer Forensics Toolkit
暫譯: 事件響應:電腦取證工具包
Douglas Schweitzer
- 出版商: Hungry Minds
- 出版日期: 2003-05-02
- 售價: $1,780
- 貴賓價: 9.5 折 $1,691
- 語言: 英文
- 頁數: 345
- 裝訂: Paperback
- ISBN: 0764526367
- ISBN-13: 9780764526367
已過版
買這商品的人也買了...
-
$980$774 -
$920$727 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$860$679 -
$1,590$1,511 -
$250$195 -
$560$476 -
$650$514 -
$1,930$1,834 -
$780$741 -
$680$537 -
$760$600 -
$590$466 -
$1,590$1,511 -
$690$538 -
$2,220$2,109 -
$750$638 -
$560$476 -
$2,390$2,271 -
$450$351 -
$660$521 -
$480$379 -
$480$408 -
$480$379 -
$720$612
商品描述
* Incident response and forensic investigation are the processes of detecting
attacks and properly extracting evidence to report the crime and conduct audits
to prevent future attacks
* This much-needed reference covers the
methodologies for incident response and computer forensics, Federal Computer
Crime law information and evidence requirements, legal issues, and working with
law enforcement
* Details how to detect, collect, and eradicate breaches in
e-mail and malicious code
* CD-ROM is packed with useful tools that help
capture and protect forensic data; search volumes, drives, and servers for
evidence; and rebuild systems quickly after evidence has been obtained
Table of Contents
Acknowledgments.
Introduction.
Chapter 1: Computer Forensics and Incident Response Essentials.
Chapter 2: Addressing Law Enforcement Considerations.
Chapter 3: Forensic Preparation and Preliminary Response.
Chapter 4: Windows Registry, Recycle Bin, and Data Storage.
Chapter 5: Analyzing and Detecting Malicious Code and Intruders.
Chapter 6: Retrieving and Analyzing Clues.
Chapter 7: Procedures for Collecting and Preserving Evidence.
Chapter 8: Incident Containment and Eradication of Vulnerabilities.
Chapter 9: Disaster Recovery and Follow-Up.
Chapter 10: Responding to Different Types of Incidents.
Chapter 11: Assessing System Security to Prevent Further Attacks.
Chapter 12: Pulling It All Together.
Appendix A: What’s on the CD-ROM.
Appendix B: Commonly Attacked Ports.
Appendix C: Field Guidance on USA Patriot Act 2001.
Appendix D: Computer Records and the Federal Rules of Evidence.
Appendix E: Glossary.
Index.
商品描述(中文翻譯)
* 事件響應和取證調查是檢測攻擊和正確提取證據以報告犯罪並進行審計以防止未來攻擊的過程。
* 這本急需的參考書涵蓋了事件響應和計算機取證的方法論、聯邦計算機犯罪法的信息和證據要求、法律問題以及與執法機構合作的內容。
* 詳細說明如何檢測、收集和消除電子郵件和惡意代碼中的漏洞。
* CD-ROM 裝載了有用的工具,幫助捕獲和保護取證數據;搜索卷、驅動器和伺服器以尋找證據;並在獲取證據後快速重建系統。
**目錄**
致謝。
引言。
第 1 章:計算機取證和事件響應基礎。
第 2 章:處理執法考量。
第 3 章:取證準備和初步響應。
第 4 章:Windows 註冊表、回收站和數據存儲。
第 5 章:分析和檢測惡意代碼和入侵者。
第 6 章:檢索和分析線索。
第 7 章:收集和保存證據的程序。
第 8 章:事件控制和漏洞消除。
第 9 章:災難恢復和後續處理。
第 10 章:對不同類型事件的響應。
第 11 章:評估系統安全以防止進一步攻擊。
第 12 章:整合所有內容。
附錄 A:CD-ROM 上的內容。
附錄 B:常見攻擊端口。
附錄 C:美國愛國者法案 2001 的現場指導。
附錄 D:計算機記錄和聯邦證據規則。
附錄 E:術語表。
索引。