Only 5 left in stock.
Ships from and sold by ShopAbroad.
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Follow the Authors

Something went wrong. Please try your request again later.

Real Digital Forensics: Computer Security and Incident Response Paperback – 13 October 2005

4.3 out of 5 stars 34 ratings

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
FREE delivery: 17 - 25 May

Enhance your purchase

Save on selected Bestselling Children's books.
Includes Bluey, Peter Rabbit, Spot, Peppa Pig, Roald Dahl and more. Click to explore.
click to open popover

Special offers and product promotions

  • Buy this item and get 90 days Free Amazon Music Unlimited. After purchase you will receive an email with further information. Offer valid for a limited time only. Terms and Conditions apply.” Learn more here.

Frequently bought together

  • Real Digital Forensics: Computer Security and Incident Response
  • +
  • File System Forensic Analysis
  • +
  • Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software: The Hands-On Guide to Dissecting Malicious Software
Total Price: $295.81
Buy the selected items together

Includes your first audiobook free, a bonus book selected by our editors, unlimited access to exclusive podcasts and more. $16.45/mo after 30 days. Cancel anytime. Learn more >

Product details

  • Publisher : Addison Wesley; 1st edition (13 October 2005)
  • Language : English
  • Paperback : 688 pages
  • ISBN-10 : 0321240693
  • ISBN-13 : 978-0321240699
  • Dimensions : 17.78 x 3.56 x 23.37 cm
  • Customer Reviews:
    4.3 out of 5 stars 34 ratings

Product description

From the Back Cover

You can't succeed in the field of computer forensics without hands-on practice―and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice.

From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.

You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.

Inside, you will find in-depth information on the following areas:

  • Responding to live incidents in both Windows and Unix environments

  • Determining whether an attack has actually occurred

  • Assembling a toolkit you can take to the scene of a computer-related crime

  • Analyzing volatile data, nonvolatile data, and files of unknown origin

  • Safely performing and documenting forensic duplications

  • Collecting and analyzing network-based evidence in Windows and Unix environments

  • Reconstructing Web browsing, e-mail activity, and Windows Registry changes

  • Tracing domain name ownership and the source of e-mails

  • Duplicating and analyzing the contents of PDAs and flash memory devices

The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.

© Copyright Pearson Education. All rights reserved.

About the Author

Keith Jones (Alexandria, VA) heads the forensics practice at Red Cliff Consulting. Former military intelligence officer Richard Bejtlich (Manassas Park, VA) is a security engineer at ManTech International Corporation's Computer Forensics and Intrusion Analysis division. A recognized authority on computer security, he has extensive experience with network security monitoring, incident response, and forensics. Curtis Rose (Alexandria, VA) is vice president of Red Cliff and an industry-recognized expert in computer security with more than eighteen years experience in investigations, computer forensics, technical, and information security.

Customer reviews

4.3 out of 5 stars
4.3 out of 5
34 global ratings
How are ratings calculated?

Review this product

Share your thoughts with other customers

Top reviews from Australia

There are 0 reviews and 0 ratings from Australia

Top reviews from other countries

5.0 out of 5 stars Excellent beginners guide to Forensics
Reviewed in the United Kingdom on 6 February 2012
Verified Purchase
Charalambos Stavrou
4.0 out of 5 stars My first book on digital forensics. The book is ...
Reviewed in the United Kingdom on 12 December 2014
Verified Purchase
for all who listen.
5.0 out of 5 stars Love this book
Reviewed in the United Kingdom on 17 August 2014
Verified Purchase
4.0 out of 5 stars Standard School book for Forensics
Reviewed in the United Kingdom on 21 October 2016
Verified Purchase
Terri Mac
5.0 out of 5 stars Five Stars
Reviewed in the United Kingdom on 16 March 2015
Verified Purchase