- Buy this item and get 90 days Free Amazon Music Unlimited. After purchase you will receive an email with further information. Offer valid for a limited time only. Terms and Conditions apply.” Learn more here.
Real Digital Forensics: Computer Security and Incident Response Paperback – 13 October 2005
|New from||Used from|
Enhance your purchase
Special offers and product promotions
Frequently bought together
- Publisher : Addison Wesley; 1st edition (13 October 2005)
- Language : English
- Paperback : 688 pages
- ISBN-10 : 0321240693
- ISBN-13 : 978-0321240699
- Dimensions : 17.78 x 3.56 x 23.37 cm
- Best Sellers Rank: 624,252 in Books (See Top 100 in Books)
- Customer Reviews:
From the Back Cover
You can't succeed in the field of computer forensics without hands-on practice―and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice.
From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.
You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.
Inside, you will find in-depth information on the following areas:
Responding to live incidents in both Windows and Unix environments
Determining whether an attack has actually occurred
Assembling a toolkit you can take to the scene of a computer-related crime
Analyzing volatile data, nonvolatile data, and files of unknown origin
Safely performing and documenting forensic duplications
Collecting and analyzing network-based evidence in Windows and Unix environments
Reconstructing Web browsing, e-mail activity, and Windows Registry changes
Tracing domain name ownership and the source of e-mails
Duplicating and analyzing the contents of PDAs and flash memory devices
The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.
© Copyright Pearson Education. All rights reserved.
About the Author
Review this product
Top reviews from other countries
The book is written in stages so that it is easy to read and understand. The applications are covered in basic detail but have enough written to understand their limitations. An added bonus is that the book has a DVD with live data that you can look at.
The book is really well written and covers a broad aspect of different digital forensics incidents.
Also the included DVD, gives you access to the files discussed during the chapters for some hands-on experience with the tools mentioned.
Negative part: After all my note taking and highlighting in the book some of the pages have come loose and tend to slip out.