share_book
Envoyer cet article par e-mail

Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions

ou partager sur :

share_comment
Partager ce commentaire par e-mail

ou partager sur :

PRÊT A ACHETER?
(vous pouvez toujours annuler plus tard)


J'aime
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions

Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions

  (Auteur),   (Auteur),   (Auteur)


Prix : Cet article n'a pas encore de prix  ask_price

Demande de cotation sur ""
Ce titre est nouveau dans notre fonds d'ouvrages et nous ne l'avons encore jamais vendu à ce jour.
Notre engagement: Vous obtenir le meilleur prix
Aussi nombreux que soient les titres que nous référençons, absolument rien n'est automatisé dans la fixation de nos prix; et plutôt que de convertir automatiquement le prix en euros et risquer de répercuter sur vous un prix artificiellement élevé, nous vous faisons un devis rapide après avoir vérifié les prix auprès de nos différents fournisseurs.
Cette étape de demande de cotation est rapide (généralement quelques heures) et vise à vous faire bénéficier en permanence du meilleur prix pour vos achats de livres.


Sur commande

Des articles qui pourraient aussi vous intéresser

    Description de "Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions"

    Learn the secrets and strategies for investigating computer crime Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies. Digital sleuthing techniques that will withstand judicial scrutiny Inside, you'll learn to: Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology Work with and store evidence in a properly configured forensic lab Deploy an effective case management strategy to collect material, document findings, and archive results Covertly investigate, triage, and work with remote data across the network Recover partitions, INFO records, and deleted, wiped, and hidden files Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools Use forensic tools to uncover obscured code, file mismatches, and invalid signatures Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries Recover vital data from handheld devices such as PDAs and cell phones About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress. Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations. Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics.

    Détails sur le produit

    • Reliure : Paperback
    • 480  pages
    • Dimensions :  2.8cmx18.5cmx22.6cm
    • Poids : 816.5g
    • Editeur :   Mcgraw-Hill Osborne Media Paru le
    • Collection : Hacking Exposed
    • ISBN :  0072256753
    • EAN13 :  9780072256758
    • Langue : Anglais

    Commentaires sur cet article

    Personne n'a encore laissé de commentaire. Soyez le premier!

    Laisser un commentaire

    Rechercher des articles similaires par rayon

    Rechercher par thèmes associés

    Learn the secrets and strategies for investigating computer crime Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies. Digital sleuthing techniques that will withstand judicial scrutiny Inside, you'll learn to: Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology Work with and store evidence in a properly configured forensic lab Deploy an effective case management strategy to collect material, document findings, and archive results Covertly investigate, triage, and work with remote data across the network Recover partitions, INFO records, and deleted, wiped, and hidden files Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools Use forensic tools to uncover obscured code, file mismatches, and invalid signatures Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries Recover vital data from handheld devices such as PDAs and cell phones About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress. Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations. Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics.