Cyber crime investigator’s field guide

Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Anothe...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Middleton, Bruce
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press LLC 2011
Những chủ đề:
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26287
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-26287
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-262872012-03-03T04:40:24Z Cyber crime investigator’s field guide Middleton, Bruce Tin học Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace. Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as: Questions to ask the client Steps to follow when you arrive at the client's site Procedures for collecting evidence Details on how to use various evidence collection and analysis tools How to recover lost passwords or documents that are password protected Commonly asked questions with appropriate answers Recommended reference materials A case study to see the computer forensic tools in action Commonly used UNIX/Linux commands Port number references for various services and applications Computer forensic software tools commands synopsis Attack signatures Cisco PIX firewall commands We now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does. Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime…tools that tell you the who, where, what, when, why, and how. 2011-10-21T07:11:03Z 2011-10-21T07:11:03Z 2002 Book 0-8493-1192-6 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26287 en application/pdf CRC Press LLC
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
topic Tin học
spellingShingle Tin học
Middleton, Bruce
Cyber crime investigator’s field guide
description Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace. Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as: Questions to ask the client Steps to follow when you arrive at the client's site Procedures for collecting evidence Details on how to use various evidence collection and analysis tools How to recover lost passwords or documents that are password protected Commonly asked questions with appropriate answers Recommended reference materials A case study to see the computer forensic tools in action Commonly used UNIX/Linux commands Port number references for various services and applications Computer forensic software tools commands synopsis Attack signatures Cisco PIX firewall commands We now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does. Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime…tools that tell you the who, where, what, when, why, and how.
format Book
author Middleton, Bruce
author_facet Middleton, Bruce
author_sort Middleton, Bruce
title Cyber crime investigator’s field guide
title_short Cyber crime investigator’s field guide
title_full Cyber crime investigator’s field guide
title_fullStr Cyber crime investigator’s field guide
title_full_unstemmed Cyber crime investigator’s field guide
title_sort cyber crime investigator’s field guide
publisher CRC Press LLC
publishDate 2011
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26287
_version_ 1757665235615875072