Hacking Exposed Computer Forensics - Softcover

Davis, Chris; Philipp, Aaron; Cowen, David

 
9780072256758: Hacking Exposed Computer Forensics

Inhaltsangabe

Whether retracing the steps of a security breech or tracking down high-tech crime, this complete computer forensics package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in court

Get the needed countermeasures for responding to incidents and advice on how to avoid common dangers from occurring during the forensics process.

Use the valuable, up-to-date computer forensics tools on the CD-ROM.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorinnen und Autoren

Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies nationwide.

Von der hinteren Coverseite

Learn the secrets and strategies for investigating computer crime

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You ll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It s all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you ll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.

Digital sleuthing techniques that will withstand judicial scrutiny

Inside, you ll learn to:

  • Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology
  • Work with and store evidence in a properly configured forensic lab
  • Deploy an effective case management strategy to collect material, document findings, and archive results
  • Covertly investigate, triage, and work with remote data across the network
  • Recover partitions, INFO records, and deleted, wiped, and hidden files
  • Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools
  • Use forensic tools to uncover obscured code, file mismatches, and invalid signatures
  • Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools
  • Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries
  • Recover vital data from handheld devices such as PDAs and cell phones

About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress.

Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations.

Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Weitere beliebte Ausgaben desselben Titels

9780071626774: Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions (Informatica)

Vorgestellte Ausgabe

ISBN 10:  0071626778 ISBN 13:  9780071626774
Verlag: McGraw Hill, 2009
Softcover