Computer Forensics: Computer Crime Scene Investigation
John R. Vacca
- 出版商: Charles River Media
- 出版日期: 2002-06-15
- 定價: $1,400
- 售價: 1.4 折 $199
- 語言: 英文
- 頁數: 600
- 裝訂: Paperback
- ISBN: 1584500182
- ISBN-13: 9781584500186
-
相關分類:
資訊安全、Computer-networks、駭客 Hack
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$1,300$1,274 -
$980$774 -
$970Introduction to Algorithms, 2/e
-
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$980Introduction to Communication Systems, 3/e
-
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,900$1,805 -
$780$741 -
$760$600 -
$590$466 -
$1,560$1,482 -
$690$538 -
$1,007C How to Program, 4/e
-
$750$675 -
$560$504 -
$450$356 -
$2,350$2,233 -
$550$468 -
$660$521 -
$480$379 -
$480$379 -
$780$702 -
$760$684 -
$720$648 -
$680$612
相關主題
商品描述
Terrorist attacks are no longer relegated to
airports and federal buildings. Using personal computers as their weapons,
hackers and criminals (some only 11 years old) have attacked the Internet,
government agencies, financial companies, small businesses, and credit card
accounts of unsuspecting individuals. This book/CD package provides a complete
overview of computer forensics from its definition to "crime scene
investigation," seizure of data, determining the "fingerprints" of the crime,
and tracking down the criminal. The book focuses on "solving the crime" rather
than information security.
Key Features:
Key Features:
- Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks
- Case studies and vignettes of actual computer crimes
- Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation Of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tacking; The Individual Exposed; Case Studies and Vignettes
- CD includes tools, presentations, and demos of the latest computer forensics software, including partition images from The Forensic Challenge
商品描述(中文翻譯)
恐怖襲擊不再僅限於機場和聯邦大樓。使用個人電腦作為武器,黑客和犯罪分子(其中一些只有11歲)已經對互聯網、政府機構、金融公司、小型企業和毫不知情的個人的信用卡帳戶進行了攻擊。這本書/光碟套裝提供了從定義到“現場調查”、數據扣押、確定犯罪“指紋”以及追踪罪犯的計算機取證的完整概述。本書重點關注的是“解決犯罪”而不是信息安全。
主要特點:
- 從定義到數據恢復技術、審計方法到恐怖分子網絡攻擊的全面概述
- 實際計算機犯罪案例研究和短篇故事
- 選定主題:計算機取證基礎知識;數據恢復;證據收集和數據扣押;數字證據的複製和保存;重建過去事件的電子證據;通過攻擊者身份識別來遏制;電子郵件的銷毀;美國政府是否準備好進行信息戰;網絡地下世界;防範隨機恐怖分子信息戰戰術;網絡足跡和犯罪追踪;個人的曝光;案例研究和短篇故事
- 光碟包括最新的計算機取證軟件工具、演示和展示,包括來自《計算機取證挑戰》的分區映像。