
Computer forensics
Incident response essentials
Résumé
From fraud and theft to forged digital signatures, computer crime is on the rise. Most computer crimes involve incoming or outgoing Internet traffic, and remote attacks, such as viruses and worms, are growing in number and sophistication.
Computer forensics, the newest branch of computer security, deals with the aftermath of an attack. The goal of computer forensics is to conduct an investigation into a compromised computer system in a manner that will hold up to legal scrutiny.
Computer Forensics is written by two experts in digital investigation, and provides extensive information on how to handle the computer as evidence. Kruse and Heiser take the reader from the initial collection of evidence through its turn over to the victim or a law enforcement official. This book covers topics ranging from an overview of encryption to creating an evidence log and case folder to how to present yourself in court. Both Unix and the Windows NT/2000 operating systems are covered for forensic examiners.
This book provides a detailed methodology for preserving the integrity of evidence by addressing the three A's of computer forensics:
- Acquire the evidence without altering or damaging the original data.
- Authenticate that your recorded evidence is the same as the original seized data.
- Analyze the data without modifying the recovered data.
Computer Forensics is written foranyone who has a computer directly connected to the Internet; it is an essential tool for anyone who may have to respond to a report of a compromised computer system.
Sommaire
- Preface
- 1: Introduction to Computer Forensics
- 2: Tracking an Offender
- 3: Hard Drives and Storage Media Basics
- 4: Encryption and Forensics
- 5: Data Hiding
- 6: Hostile Code
- 7: Your electronic Toolkit
- 8: Investigating Windows Computers
- 9: Introduction to Unix for Forensic Examiners
- 10: Compromising a Unix Host
- 11: Investigating a Unix Host
- 12: Introduction to the Criminal Justice System
- 13: Conclusion
- Appendix A: How to Become a Unix Guru
- Appendix B: Exporting a Windows 2000 Private Key
- Appendix C: Incident Response Plan
- Appendix D: Sidebars
- Bibliography
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Warren G Kruse, Jay G Heiser |
Parution | 25/10/2001 |
Nb. de pages | 392 |
Format | 18,7 x 23,4 |
Couverture | Broché |
Poids | 631g |
Intérieur | Noir et Blanc |
EAN13 | 9780201707199 |
ISBN13 | 978-0-201-70719-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet