0

My Bag

0.00

Download App

Real Digital Forensics: Computer Security and Incident Response 24.0%OFF

Real Digital Forensics: Computer Security and Incident Response

by Keith J. Jones, Richard Bejtlich and Curtis W. Rose

  • ISBN

    :  

    9780321240699

  • Publisher

    :  

    Addison-Wesley Professional

  • Subject

    :  

    Business Applications, Computer Security, Computer Networking & Communications

  • Binding

    :  

    PAPERBACK

  • Pages

    :  

    688

  • Year

    :  

    2005

6995.0

24.0% OFF

5316.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

(Imported Edition) Estimated Shipping Time : 25-28 Business Days

View Details

Share it on

  • Description

    You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting. A(c) Copyright Pearson Education. All rights reserved.

Related Items

-

of

  • OFFER

    Worm: The First Digital World War

    Mark Bowden

    Starts At

    412.0

    550.0

    25% OFF

  • Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives

    Sunit Belapure Nina Godbole

    Starts At

    909.0

  • OFFER

    Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)

    Bill Hutchinson

    Starts At

    3562.0

    4687.0

    24% OFF

  • OFFER

    Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides

    MALIN

    Starts At

    6612.0

    8700.0

    24% OFF

  • Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks

    Nedeljko Cvejic

    Starts At

    15354.0

  • OFFER

    Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share

    Stuart Campbell Mary Pat Mccarthy

    Starts At

    1830.0

    2128.0

    14% OFF

  • OFFER

    Advances in Digital Forensics II (IFIP Advances in Information and Communication Technology) (v. 2)

    Martin S. Olivier

    Starts At

    15149.0

    15781.0

    4% OFF

  • OFFER

    Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)

    Bahram Javidi

    Starts At

    13920.0

    14500.0

    4% OFF

  • OFFER

    Digital Watermarking: 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings (Lecture Notes in Computer Science/ Security and Cryptology)

    Anthony T. S. Ho

    Starts At

    8107.0

    8445.0

    4% OFF

  • OFFER

    Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings (Lecture ... Computer Science / Security and Cryptology)

    Simone Fischer-Hýbner

    Starts At

    8107.0

    8445.0

    4% OFF

  • OFFER

    Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers (Lecture Notes in Computer Science / Security and Cryptology)

    Hyoung-Joong Kim

    Starts At

    10563.0

    11004.0

    4% OFF

  • OFFER

    Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture ... Computer Science / Security and Cryptology)

    Starts At

    7684.0

    8445.0

    9% OFF

  • OFFER

    Digital Watermarking: 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)

    Yun Q. Shi

    Starts At

    10563.0

    11004.0

    4% OFF

  • OFFER

    Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Information Security)

    Albert Marcella Jr.

    Starts At

    10980.0

    12768.0

    14% OFF

  • OFFER

    Digital Privacy: Theory, Technologies, and Practices

    Alessandro Acquisti

    Starts At

    12103.0

    14074.0

    14% OFF

  • OFFER

    Computer and Intrusion Forensics

    George Mohay

    Starts At

    18228.0

    25674.0

    29% OFF

  • OFFER

    Information Hiding Techniques for Steganography and Digital Watermarking

    Stefan Katzenbeisser

    Starts At

    6270.0

    8831.0

    29% OFF

  • OFFER

    Handbook of Electronic Security and Digital Forensics

    Hamid Jahankhani

    Starts At

    27728.0

    32243.0

    14% OFF

  • OFFER

    Guide to Computer Forensics and Investigations

    Bill Nelson

    Starts At

    8255.0

    11627.0

    29% OFF

  • Securing Business Information: Strategies to Protect the Enterprise and Its Network

    Chrisitan F. Byrnes

    Starts At

    1105.0

  • OFFER

    Internet Security: Hacking, Counterhacking, and Security

    Kenneth Einar Himma

    Starts At

    2625.0

    3241.0

    19% OFF

  • OFFER

    Protecting Business Information: A Manager's Guide

    James A Schweitzer

    Starts At

    5351.0

    6223.0

    14% OFF

  • OFFER

    Ultimate Financial Security Survey

    James L Schaub

    Starts At

    11957.0

    13904.0

    14% OFF

  • OFFER

    PDA Security : Incorporating Handhelds into the Enterprise

    DavidMelnick

    Starts At

    2930.0

    3408.0

    14% OFF

  • OFFER

    Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

    Dieter Gollmann

    Starts At

    22927.0

    23883.0

    4% OFF

  • OFFER

    Electronic Postage Systems: Technology, Security, Economics (Advances in Information Security)

    Gerrit Bleumer

    Starts At

    14738.0

    15353.0

    4% OFF

  • OFFER

    Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May ... in Information and Communication Technology)

    Simone Fischer-Hýbner

    Starts At

    16376.0

    17059.0

    4% OFF

  • OFFER

    Recent Advances in RSA Cryptography (Advances in Information Security)

    Stefan Katzenbeisser

    Starts At

    16296.0

    16975.0

    4% OFF

  • OFFER

    Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers (Lecture Notes in Computer Science)

    martin r. (author) ; kaliski

    Starts At

    9006.0

    9382.0

    4% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary