Computer Forensics Incident Response Essential (Paperback)
Warren G. Kruse II, Jay G. Heiser
- 出版商: Addison Wesley
- 出版日期: 2001-09-26
- 定價: $1,930
- 售價: 6.0 折 $1,158
- 語言: 英文
- 頁數: 416
- 裝訂: Paperback
- ISBN: 0201707195
- ISBN-13: 9780201707199
-
相關分類:
資訊安全、Computer-networks、駭客 Hack
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$650$553 -
$6,600$6,270 -
$980$774 -
$600$510 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$690$587 -
$760$600 -
$590$466 -
$620$527 -
$1,550$1,473 -
$690$538 -
$720$569 -
$750$675 -
$560$504 -
$1,102Unix Network Programming, Vol. 1 : The Sockets Networking API, 3/e (IE-Paperback)
-
$480$379 -
$5,110$4,855 -
$620$527 -
$750$593 -
$540$427 -
$1,100$1,078 -
$299$254 -
$880$616 -
$600$480 -
$380$296
相關主題
商品描述
Written by two experts in digital investigation, Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the student through the complete forensics process蕞瞞rom the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered.
Table of Contents
Preface.
Acknowledgments.
1. Introduction to Computer Forensics.
2. Tracking an Offender.
3. The Basics of Hard Drives and Storage.
4. Encryption and Forensics.
5. Data Hiding.
6. Hostile Code.
7.
Your Electronic Toolkit.
8. Investigating Windows Computers.
9.
Introduction to Unix for Forensic Examiners.
10. Compromising a Unix Host.
11. Investigating a Unix Host.
12. Introduction to the Criminal Justice
System.
13. Conclusion.
Appendix A. Internet Data Center Response Plan.
Appendix B. Incident Response Triage Questionnaire.
Appendix C. How to
Become a Unix Guru.
Appendix D. Exporting a Windows 2000 Personal
Certificate.
Appendix E. How to Crowbar Unix Hosts.
Appendix F. Creating
a Linux Boot CD.
Appendix G. Contents of a Forensic CD.
Annotated
Bibliography.
商品描述(中文翻譯)
由兩位數位調查專家撰寫,《電腦取證》提供了關於如何將電腦作為證據處理的詳細資訊。Kruse和Heiser將引導讀者從收集證據的初步階段到最終報告的整個取證過程。主題包括加密的取證相關概述,尋找數位證據的線索,以及在法庭上有效呈現證據和結論的最佳方式。該書還詳細介紹了與Unix和Windows NT/2000操作系統相關的獨特取證問題。
目錄:
前言。
致謝。
1. 電腦取證簡介。
2. 追蹤犯罪者。
3. 硬碟和儲存基礎知識。
4. 加密和取證。
5. 資料隱藏。
6. 惡意程式碼。
7. 電子工具箱。
8. 調查Windows電腦。
9. Unix入門指南。
10. 入侵Unix主機。
11. 調查Unix主機。
12. 刑事司法系統簡介。
13. 結論。
附錄A. 網際網路資料中心應變計劃。
附錄B. 事件應變篩選問卷。
附錄C. 如何成為Unix專家。
附錄D. 匯出Windows 2000個人憑證。
附錄E. 如何破解Unix主機。
附錄F. 創建Linux啟動光碟。
附錄G. 取證光碟內容。
註解書目。