Hacking Exposed Computer Forensics - Computer Forensics Secrets and Solutions (Paperback, Ed)

, ,
Learn the secrets and strategies for investigating computer crime.

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. Youll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. Its all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, youll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies..

Digital sleuthing techniques that will withstand judicial scrutiny.

Inside, youll learn to: . . Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology . Work with and store evidence in a properly configured forensic lab . Deploy an effective case management strategy to collect material, document findings, and archive results. Covertly investigate, triage, and work with remote data across the network. Recover partitions, INFO records, and deleted, wiped, and hidden files. Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools. Use forensic tools to uncover obscured code, file mismatches, and invalid signatures. Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools. Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries. Recover vital data fromhandheld devices such as PDAs and cell phones. .

About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress..

Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations..

Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics..


R678
List Price R725
Save R47 6%

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles6780
Mobicred@R64pm x 12* Mobicred Info
Free Delivery
Delivery AdviceOut of stock

Toggle WishListAdd to wish list
Review this Item

Product Description

Learn the secrets and strategies for investigating computer crime.

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. Youll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. Its all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, youll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies..

Digital sleuthing techniques that will withstand judicial scrutiny.

Inside, youll learn to: . . Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology . Work with and store evidence in a properly configured forensic lab . Deploy an effective case management strategy to collect material, document findings, and archive results. Covertly investigate, triage, and work with remote data across the network. Recover partitions, INFO records, and deleted, wiped, and hidden files. Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools. Use forensic tools to uncover obscured code, file mismatches, and invalid signatures. Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools. Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries. Recover vital data fromhandheld devices such as PDAs and cell phones. .

About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress..

Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations..

Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics..

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Osborne McGraw-Hill

Country of origin

United States

Series

Hacking Exposed

Release date

May 2008

Availability

Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available.

First published

October 2004

Authors

, ,

Dimensions

230 x 189 x 24mm (L x W x T)

Format

Paperback

Pages

480

Edition

Ed

ISBN-13

978-0-07-225675-8

Barcode

9780072256758

Categories

LSN

0-07-225675-3



Trending On Loot