Computer Forensics: Computer Crime Scene Investigation
John R. Vacca
- 出版商: Charles River Media
- 出版日期: 2002-06-15
- 定價: $1,400
- 售價: 2.1 折 $299
- 語言: 英文
- 頁數: 600
- 裝訂: Paperback
- ISBN: 1584500182
- ISBN-13: 9781584500186
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$1,300$1,274 -
$980$833 -
$990$970 -
$1,300$1,235 -
$1,000$950 -
$1,050$998 -
$1,630$1,549 -
$780$741 -
$760$646 -
$590$466 -
$1,340$1,273 -
$690$538 -
$1,060$1,007 -
$750$638 -
$560$476 -
$450$383 -
$1,900$1,805 -
$550$468 -
$660$561 -
$480$379 -
$480$408 -
$780$702 -
$760$646 -
$720$612 -
$680$578
相關主題
商品描述
Terrorist attacks are no longer relegated to
airports and federal buildings. Using personal computers as their weapons,
hackers and criminals (some only 11 years old) have attacked the Internet,
government agencies, financial companies, small businesses, and credit card
accounts of unsuspecting individuals. This book/CD package provides a complete
overview of computer forensics from its definition to "crime scene
investigation," seizure of data, determining the "fingerprints" of the crime,
and tracking down the criminal. The book focuses on "solving the crime" rather
than information security.
Key Features:
Key Features:
- Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks
- Case studies and vignettes of actual computer crimes
- Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation Of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tacking; The Individual Exposed; Case Studies and Vignettes
- CD includes tools, presentations, and demos of the latest computer forensics software, including partition images from The Forensic Challenge