Computer Forensics
Computer Crime Scene Investigation
Résumé
Terrorist attacks are no longer relegated to airports
and federal buildings. Using personal computers as their
weapons, hackers and criminals (some only 11 years old)
have attacked the Internet, government agencies, financial
companies, small businesses, and credit card accounts of
unsuspecting individuals. This book/CD package provides a
complete overview of computer forensics from its definition
to "crime scene investigation," seizure of data,
determining the "fingerprints" of the crime, and tracking
down the criminal. The book focuses on "solving the crime"
rather than information security.
Key Features:
- Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks
- Case studies and vignettes of actual computer crimes
- Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation Of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tacking; The Individual Exposed; Case Studies and Vignettes
- CD includes tools, presentations, and demos of the latest computer forensics software, including partition images from The Forensic Challenge
Contents
- Overview of Computer Forensics Technology
- Computer Forensics Evidence and capture
- Computer Forensics Analysis
- Countermeasures: Information Warfare
- Results and future directions
- Appendixes
L'auteur - John R. Vacca
John R. Vacca is an Information Technology and
Air-and-Space Freelance Research Contract Writer/Consultant
based in Houston. Since 1982, John has authored and
published over 300 articles and 13 books in the areas of
programming, systems development,
multimedia, and the Internet. His articles have appeared in
hundreds of magazines including Byte, Internet World, and
Computer World. John was also a configuration management
specialist, computer specialist, and the computer security
official for
NASA's space station program (Freedom) and the Alpha
program, from 1988 until his early retirement from NASA in
1995.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Charles River Media |
Auteur(s) | John R. Vacca |
Parution | 26/07/2002 |
Nb. de pages | 732 |
Format | 18,7 x 23,4 |
Couverture | Broché |
Poids | 1182g |
Intérieur | Noir et Blanc |
EAN13 | 9781584500186 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet