Search by title, author or ISBN

Real Digital Forensics

Cover Art for 9780321240699, Real Digital Forensics by Keith J. Jones
Add an alert Add to a list

Add a alert

Enter prices below and click 'Add'. You will receive an alert when the book is available for less than the new or used price you specify.

Alert if:
Close

Add this book to a list

You can add this book to any one of your lists. Just select the list below, and click 'Add'.

Close
ISBN: 9780321240699
Publisher: Addison-Wesley Professional
Published: 30 September, 2005
Format: Book with Other Items
Language: English
Links Australian Libraries (Trove)

Please describe the issue

If you have noticed an incorrect price, image or just something you'd like to tell us, enter it below. Please include your email address if you'd like a reply.

Real Digital Forensics

You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions.This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting. A(c) Copyright Pearson Education. All rights reserved.

NEW ITEMS
Prices in $USD. Prices updated .
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...
USED ITEMS
Prices in $USD
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...
Booko is reader-supported. When you buy through links on our site, we may earn an affiliate commission. Learn more

Historical Prices

Loading...
This graph is for informational purposes only. Occasionally pricing data is captured incorrectly, through bugs in Booko or the stores supplying data, which may distort the graph, providing undue hope that even lower prices sometimes appear.

Recently Updated