
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Business Application... | >> | Real Digital Forensi... |
ISBN
:
9780321240699
Publisher
:
Addison-Wesley Professional
Subject
:
Business Applications, Computer Security, Computer Networking & Communications
Binding
:
PAPERBACK
Pages
:
688
Year
:
2005
₹
6995.0
₹
5316.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View Details(Imported Edition) Estimated Shipping Time : 25-28 Business Days
View DetailsDescription
You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting. A(c) Copyright Pearson Education. All rights reserved.
Related Items
-
of
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Bill Hutchinson
Starts At
3562.0
4687.0
24% OFF
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
MALIN
Starts At
6612.0
8700.0
24% OFF
Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share
Stuart Campbell Mary Pat Mccarthy
Starts At
1830.0
2128.0
14% OFF
Advances in Digital Forensics II (IFIP Advances in Information and Communication Technology) (v. 2)
Martin S. Olivier
Starts At
15149.0
15781.0
4% OFF
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Bahram Javidi
Starts At
13920.0
14500.0
4% OFF
Digital Watermarking: 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings (Lecture Notes in Computer Science/ Security and Cryptology)
Anthony T. S. Ho
Starts At
8107.0
8445.0
4% OFF
Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings (Lecture ... Computer Science / Security and Cryptology)
Simone Fischer-Hýbner
Starts At
8107.0
8445.0
4% OFF
Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers (Lecture Notes in Computer Science / Security and Cryptology)
Hyoung-Joong Kim
Starts At
10563.0
11004.0
4% OFF
Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture ... Computer Science / Security and Cryptology)
Starts At
7684.0
8445.0
9% OFF
Digital Watermarking: 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)
Yun Q. Shi
Starts At
10563.0
11004.0
4% OFF
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Information Security)
Albert Marcella Jr.
Starts At
10980.0
12768.0
14% OFF
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti
Starts At
12103.0
14074.0
14% OFF
Information Hiding Techniques for Steganography and Digital Watermarking
Stefan Katzenbeisser
Starts At
6270.0
8831.0
29% OFF
Handbook of Electronic Security and Digital Forensics
Hamid Jahankhani
Starts At
27728.0
32243.0
14% OFF
Internet Security: Hacking, Counterhacking, and Security
Kenneth Einar Himma
Starts At
2625.0
3241.0
19% OFF
Protecting Business Information: A Manager's Guide
James A Schweitzer
Starts At
5351.0
6223.0
14% OFF
PDA Security : Incorporating Handhelds into the Enterprise
DavidMelnick
Starts At
2930.0
3408.0
14% OFF
Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)
Dieter Gollmann
Starts At
22927.0
23883.0
4% OFF
Electronic Postage Systems: Technology, Security, Economics (Advances in Information Security)
Gerrit Bleumer
Starts At
14738.0
15353.0
4% OFF
Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May ... in Information and Communication Technology)
Simone Fischer-Hýbner
Starts At
16376.0
17059.0
4% OFF
Recent Advances in RSA Cryptography (Advances in Information Security)
Stefan Katzenbeisser
Starts At
16296.0
16975.0
4% OFF
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers (Lecture Notes in Computer Science)
martin r. (author) ; kaliski
Starts At
9006.0
9382.0
4% OFF