Warehouse Stock Clearance Sale

Grab a bargain today!


Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
Hacking Exposed Computer ­Forensics
Computer Forensics Secrets and Solutions (Hacking Exposed)

Rating
47 Ratings by Goodreads
Already own it? Write a review
Format
Paperback, 480 pages
Published
United States, 22 November 2004

Learn the secrets and strategies for investigating computer crime

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.

Digital sleuthing techniques that will withstand judicial scrutiny

Inside, you'll learn to: Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology Work with and store evidence in a properly configured forensic lab Deploy an effective case management strategy to collect material, document findings, and archive results Covertly investigate, triage, and work with remote data across the network Recover partitions, INFO records, and deleted, wiped, and hidden files Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools Use forensic tools to uncover obscured code, file mismatches, and invalid signatures Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries Recover vital data from handheld devices suchas PDAs and cell phones

About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress.

Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations.

Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics.

Show more

Our Price
HK$700
Ships from UK Estimated delivery date: 16th Apr - 24th Apr from UK
Free Shipping Worldwide

Buy Together
+
Buy together with Computer Forensics Infosec Pro Guide at a great price!
Buy Together
HK$997
Elsewhere Price
HK$1,102.11
You Save HK$105.11 (10%)

Product Description

Learn the secrets and strategies for investigating computer crime

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.

Digital sleuthing techniques that will withstand judicial scrutiny

Inside, you'll learn to: Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology Work with and store evidence in a properly configured forensic lab Deploy an effective case management strategy to collect material, document findings, and archive results Covertly investigate, triage, and work with remote data across the network Recover partitions, INFO records, and deleted, wiped, and hidden files Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools Use forensic tools to uncover obscured code, file mismatches, and invalid signatures Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries Recover vital data from handheld devices suchas PDAs and cell phones

About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress.

Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations.

Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics.

Show more
Product Details
EAN
9780072256758
ISBN
0072256753
Age Range
Other Information
100 Illustrations, unspecified
Dimensions
18.5 x 2.3 x 22.9 centimeters (2.30 kg)

Table of Contents

Part I: Preparing for an Incident Chapter 1: The Forensics Process Chapter 2: Computer Fundamentals Chapter 3: Forensic Lab Environment Preparation Part II: Collecting the Evidence Chapter 4: Forensically Sound Evidence Collection Chapter 5: Remote Investigations and Collections Part III: Forensic Investigation Techniques Chapter 6: Microsoft Windows Systems Analysis Chapter 7: Linux Analysis Chapter 8: Macintosh Analysis Chapter 9: Defeating Anti-Forensic Techniques Chapter 10: Enterprise Storage Analysis Chapter 11: E-mail Analysis Chapter 12: Tracking User Activity Chapter 13: Cell Phone and PDA Analysis Part IV: Presenting Your Findings Chapter 14: Documenting the Investigation Chapter 15: The Justice System Part V: Appendixes Appendix A: Forensic Forms and Checklists Appendix B: Understanding Legal Concerns Appendix C: The Digital Evidence Legal Process Appendix D: Searching Techniques Appendix E: The Investigator’s Toolkit Glossary

About the Author

Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics. David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies nationwide.

Show more
Review this Product
Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » Networking » General
Home » Books » Computers » Security » Networking
Home » Books » Computers » Programming » General
People also searched for
Item ships from and is sold by Fishpond World Ltd.

Back to top