Cyber Crime Investigator's Field Guide, Second Edition

* Analyzes the use of the latest evidence collection and analysis tools * Details how to use evidence collection and analysis tools including AccessData's Forensic Tool Kit®, Guidance Software's EnCase® 3 & 4, ILook Investigator©, and a variety of tools from NTI * Covers ever...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Middleton, Bruce
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1365
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1365
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-13652009-11-27T09:47:45Z Cyber Crime Investigator's Field Guide, Second Edition Middleton, Bruce * Analyzes the use of the latest evidence collection and analysis tools * Details how to use evidence collection and analysis tools including AccessData's Forensic Tool Kit®, Guidance Software's EnCase® 3 & 4, ILook Investigator©, and a variety of tools from NTI * Covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime. This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more. THE INITIAL CONTACT CLIENT SITE ARRIVAL EVIDENCE COLLECTION PROCEDURES EVIDENCE COLLECTION AND ANALYSIS TOOLS ACCESSDATA'S FORENSIC TOOL KIT GUIDANCE SOFTWARE'S ENCASE ILOOK INVESTIGATOR PASSWORD RECOVERY QUESTIONS AND ANSWERS BY SUBJECT AREA RECOMMENDED REFERENCE MATERIALS CASE STUDY APPENDIX A: GLOSSARY APPENDIX B: PORT NUMBERS USED BY MALICIOUS TROJAN HORSE PROGRAMS APPENDIX C: ATTACK SIGNATURES APPENDIX D: UNIX/LINUX COMMANDS APPENDIX E: CISCO PIX FIREWALL COMMANDS APPENDIX F: DISCOVERING UNAUTHORIZED ACCESS TO YOUR COMPUTER APPENDIX G: ELECTROMAGNETIC FIELD ANALYSIS (EFA) "TICKLER" APPENDIX H: THE INTELLIGENCE COMMUNITY SINCE 9/11 APPENDIX I: ANSWERS TO CHAPTER QUESTIONS 2009-11-27T09:47:45Z 2009-11-27T09:47:45Z 2005 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1365 en application/octet-stream CRC Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description * Analyzes the use of the latest evidence collection and analysis tools * Details how to use evidence collection and analysis tools including AccessData's Forensic Tool Kit®, Guidance Software's EnCase® 3 & 4, ILook Investigator©, and a variety of tools from NTI * Covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime. This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.
format Book
author Middleton, Bruce
spellingShingle Middleton, Bruce
Cyber Crime Investigator's Field Guide, Second Edition
author_facet Middleton, Bruce
author_sort Middleton, Bruce
title Cyber Crime Investigator's Field Guide, Second Edition
title_short Cyber Crime Investigator's Field Guide, Second Edition
title_full Cyber Crime Investigator's Field Guide, Second Edition
title_fullStr Cyber Crime Investigator's Field Guide, Second Edition
title_full_unstemmed Cyber Crime Investigator's Field Guide, Second Edition
title_sort cyber crime investigator's field guide, second edition
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1365
_version_ 1757669501120282624