E-Book, Englisch, 448 Seiten
Casey BS / Casey Handbook of Computer Crime Investigation
1. Auflage 2001
ISBN: 978-0-08-048890-5
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Forensic Tools and Technology
E-Book, Englisch, 448 Seiten
ISBN: 978-0-08-048890-5
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical 'how to' information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations. - The Tools section provides details of leading hardware and software - The main Technology section provides the technical 'how to' information for collecting and analysing digital evidence in common situations - Case Examples give readers a sense of the technical, legal, and practical challenges that arise in real computer investigations
Autoren/Hrsg.
Weitere Infos & Material
1;Cover;1
2;Contents;6
3;About the Authors;8
4;Acknowledgements;14
5;Chapter 1. Introduction;16
6;Chapter 2. The Other Side of Civil Discovery;32
7;Section 1: Tools;68
7.1;Chapter 3. The Encase Process;68
7.2;Chapter 4. Incident Response Tools;88
7.3;Chapter 5. NFR Security;108
7.4;Chapter 6. Tool Testing and Analytical Methodology;130
8;Section 2: Technology;148
8.1;Chapter 7. Forensic Analysis of Windows Systems;148
8.2;Chapter 8. Unix System Analysis;182
8.3;Chapter 9. Network Analysis;216
8.4;Chapter 10. Wireless Network Analysis;298
8.5;Chapter 11. Embedded Systems Analysis;330
9;Section 3: Case Examples;376
9.1;Chapter 12. Homicide and Child Pornography;376
9.2;Chapter 13. Investigating Internet Gambling;390
9.3;Chapter 14. Computer Intrusions;410
10;Appendix 1;430
11;Appendix 2;434
12;Appendix 3;440
13;Appendix 4;448
14;Appendix 5;450
15;Author Index;452
16;Subject Index;454