Hacking Exposed Computer Forensics, Third Edition
McGraw-Hill Professional (Verlag)
978-0-07-181774-5 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
The most comprehensive and current computer forensics handbook explains today's leading tools and investigation techniques. Hacking Exposed Computer Forensics, Third Edition reveals how to identify and investigate computer crimes of all types, and explains how to construct a high-tech forensics lab, collect prosecutable evidence, discover email and system file clues, track wireless activity, and recover obscured documents. You'll learn how to recreate the path of the attacker, access a variety of devices, gather evidence, communicate with attorneys about their investigations, and prepare reports.
In addition to a top-down update of the content, the book features several all-new chapters on the topics of cloud forensics, malware analysis, and laws and regulations in the European Union. The Hacking Exposed brand is synonymous with practical get-the-job-done tips for security practitioners. Threats to information security are more virulent today than ever before-this new edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest digital forensics cases ever seen.
Features three completely new chapters on cloud forensics, malware analysis, and laws and regulations in the European Union with information on data restrictions concerning international investigationsExplains how to restore deleted documents, partitions, user activities, and file systemsDetails techniques for unlocking clues stored in mobile devicesCovers how to analyze evidence gathered from Windows, Linux, and Mac systems
David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies nationwide.
Part I: Preparing for an Incident
Chapter 1: The Forensics Process
Chapter 2: Computer Fundamentals
Chapter 3: Forensic Lab Environment Preparation
Part II: Collecting the Evidence
Chapter 4: Forensically Sound Evidence Collection
Chapter 5: Enterprise Forensic Collections
Part III: Forensic Analysis
Chapter 6: Malware
Chapter 7: Microsoft Windows Systems Analysis
Chapter 8: Linux Analysis
Chapter 9: Macintosh Analysis
Chapter 10: Cloud Analysis
Chapter 11: Memory Analysis
Chapter 12: Defeating Anti-Forensic Techniques
Chapter 13: Enterprise Server and Storage Analysis
Chapter 14: Email Analysis
Chapter 15: Internet History Analysis
Chapter 16: Mobile Forensics
Part IV: Presenting Your Findings
Chapter 17: Documenting the Investigation
Chapter 18: Investigations in the US Legal System
Chapter 19: Investigations in the Euro Legal System
Chapter 20: Investigations Between Legal Systems
Part V: Advanced Forensics
Chapter 21: External Device Analysis
Chapter 22: Tracking the Cloud
Chapter 23: Enterprise Networks
Chapter 24: Server Side Application Forensics
Chapter 25: Source Code Analysis
Appendix A: Searching Techniques
Erscheint lt. Verlag | 16.7.2016 |
---|---|
Reihe/Serie | Hacking Exposed |
Zusatzinfo | 210 Illustrations, unspecified |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Recht / Steuern ► Strafrecht ► Kriminologie | |
ISBN-10 | 0-07-181774-3 / 0071817743 |
ISBN-13 | 978-0-07-181774-5 / 9780071817745 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich