Computer Forensics: Computer Crime Scene Investigation, 3/e(Paperback)

John R. Vacca

  • 出版商: Jones and Bartlett
  • 出版日期: 2022-12-30
  • 售價: $6,880
  • 貴賓價: 9.5$6,536
  • 語言: 英文
  • 頁數: 1200
  • 裝訂: Paperback
  • ISBN: 0763779970
  • ISBN-13: 9780763779979
  • 無法訂購

商品描述

Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and include fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organizationa (TM)s internal computer security specialists with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised systems, ultimately saving the organization the high cost of hiring an outside team of computer forensic investigators. This updated Third Edition includes a comprehensive introduction to computer forensics investigative techniques and provides the knowledge and skills required to conduct a computer forensics investigation from initial discovery to completion. This book also provides the details for an organization's Computer Incident Response Team (CIRT); to collect, manage, and record digital evidence; and to leverage powerful software tools and techniques to uncover hidden or deleted information. Key topics include: Responding to incidents and investigating computer crime, conducting and managing an investigation, performing disk-based analysis, investigating information-hiding techniques, examining e-mail, tracing internet access, searching memory in real-time, and the forensics challenge competition.

商品描述(中文翻譯)

儘管組織努力保護敏感數據和網絡,但它們仍面臨著日益增長的網絡犯罪和安全違規的威脅。這些攻擊可能來自內部或外部來源,包括欺詐、侵犯版權和數據被盜。這本電腦取證和事件回應書為組織的內部電腦安全專家提供了一種合法的方法來處理電腦濫用,並確保敏感數據的安全,並識別受到侵害的系統,從而節省組織雇用外部電腦取證調查人員的高昂成本。這本更新的第三版包括對電腦取證調查技術的全面介紹,並提供進行電腦取證調查所需的知識和技能,從最初的發現到完成。本書還提供了組織的電腦事件回應團隊(CIRT)的詳細信息;收集、管理和記錄數字證據;以及利用強大的軟件工具和技術來發現隱藏或刪除的信息。主要主題包括:應對事件和調查電腦犯罪,進行和管理調查,進行基於磁盤的分析,調查信息隱藏技術,檢查電子郵件,追踪網絡訪問,實時搜索內存以及取證挑戰競賽。