Libros > Libros de informática > Seguridad > Real World Digital Forensics: Computer Security & Incident Response Book/DVD Package
Portada de Real World Digital Forensics: Computer Security & Incident Response Book/dvd Package

Real World Digital Forensics: Computer Security & Incident Response Book/dvd Package

Autor:Richard Bejtlich;
Categoría:Seguridad
ISBN: 9780321240699
ADDISON-WESLEY nos ofrece Real World Digital Forensics: Computer Security & Incident Response Book/dvd Package , disponible en nuestra tienda desde el 01 de Octubre del 2005. Amplía tus conocimientos sobre el mundo de los ordenadores con este libro de informática, perfectamente adaptado para todos los lectores por su cuidado contenido. Este libro cuenta con un total de 650 páginas (0).
Leer argumento »
Ver todas las novedades de libros »

Otros clientes que compraron Real World Digital Forensics: Computer Security & Incident Response Book/DVD Package también compraron:

Argumento de Real World Digital Forensics: Computer Security & Incident Response Book/dvd Package

From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.

You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.

Inside, you will find in-depth information on the following areas:

  • Responding to live incidents in both Windows and Unix environments

  • Determining whether an attack has actually occurred

  • Assembling a toolkit you can take to the scene of a computer-related crime

  • Analyzing volatile data, nonvolatile data, and files of unknown origin

  • Safely performing and documenting forensic duplications

  • Collecting and analyzing network-based evidence in Windows and Unix environments

  • Reconstructing Web browsing, e-mail activity, and Windows Registry changes

  • Tracing domain name ownership and the source of e-mails

  • Duplicating and analyzing the contents of PDAs and flash memory devices

The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.

© Copyright Pearson Education. All rights reserved.0

Ultimacomic es una marca registrada por Ultimagame S.L - Ultimacomic.com y Ultimagame.com pertenecen a la empresa Ultimagame S.L - Datos Fiscales: B92641216 - Datos de Inscripción Registral: Inscrita en el Registro Mercantíl de Málaga, TOMO: 3815. LIBRO: 2726. FOLIO: 180. HOJA: MA-77524.
2003 - 2019, COPYRIGHT ULTIMAGAME S.L. - Leer esta página significa estar deacuerdo con la Política de privacidad y de uso