Hacking Exposed Computer Forensics, 2/e: Computer Forensics Secrets & Solutions (Paperback)
暫譯: 駭客攻擊揭密:電腦取證,第二版:電腦取證的秘密與解決方案(平裝本)
Aaron Philipp, David Cowen, Chris Davis
- 出版商: McGraw-Hill Education
- 出版日期: 2009-10-01
- 定價: $1,500
- 售價: 5.0 折 $750
- 語言: 英文
- 頁數: 544
- 裝訂: Paperback
- ISBN: 0071626778
- ISBN-13: 9780071626774
-
相關分類:
駭客 Hack
立即出貨
買這商品的人也買了...
-
$872Machine Vision
-
$780$741 -
$980$774 -
$650$553 -
$980$774 -
$530$350 -
$650$514 -
$680$537 -
$530$199 -
$420$328 -
$750$593 -
$520$411 -
$820$648 -
$580$493 -
$620$484 -
$490$323 -
$520$416 -
$2,030$1,929 -
$450$351 -
$420$332 -
$450$297 -
$620$484 -
$600$510 -
$950$751 -
$850$672
相關主題
商品描述
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation
The latest strategies for investigating cyber-crime
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
- Effectively uncover, capture, and prepare evidence for investigation
- Store and process collected data in a highly secure digital forensic lab
- Restore deleted documents, partitions, user activities, and file systems
- Analyze evidence gathered from Windows, Linux, and Macintosh systems
- Use the latest Web and client-based e-mail tools to extract relevant artifacts
- Overcome the hacker's anti-forensic, encryption, and obscurity techniques
- Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
- Prepare legal documents that will hold up to judicial and defense scrutiny
商品描述(中文翻譯)
「以簡單明瞭且具資訊性的方式提供實用的操作知識,將所有複雜的部分結合在一起,並透過真實案例研究來說明。...提供市場上最有價值的見解。作者直截了當地指出,人們必須理解的內容,以有效地執行電腦取證調查。」--Brian H. Karney, COO, AccessData Corporation
調查網路犯罪的最新策略
在這本全面更新的真實資源中,識別並調查各類電腦罪犯。《Hacking Exposed Computer Forensics, Second Edition》解釋了如何建立高科技取證實驗室、收集可起訴的證據、發現電子郵件和系統檔案的線索、追蹤無線活動以及恢復被隱藏的文件。學習如何重建攻擊者的足跡、與法律顧問溝通、準備法庭報告,並解決法律和組織挑戰。來自當前新聞頭條的案例研究涵蓋了知識產權盜竊、抵押貸款詐騙、員工不當行為、證券詐騙、挪用公款、組織犯罪和消費者詐騙案件。
- 有效地揭露、捕捉並準備調查證據
- 在高度安全的數位取證實驗室中儲存和處理收集的數據
- 恢復已刪除的文件、分區、用戶活動和檔案系統
- 分析從 Windows、Linux 和 Macintosh 系統收集的證據
- 使用最新的網路和客戶端電子郵件工具提取相關的文物
- 克服駭客的反取證、加密和隱蔽技術
- 解鎖儲存在手機、PDA 和 Windows Mobile 設備中的線索
- 準備能夠經得起司法和辯護審查的法律文件