Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Hacking Exposed Computer Forensics
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Hacking Exposed Computer Forensics

Hacking Exposed Computer Forensics

Secrets and Solutions

Chris J. Davis, Aaron Philipp, David Cowen - Collection Security

444 pages, parution le 10/01/2005

Résumé

Learn secrets and Strategies for investigating computer crime

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.

Inside, you'll learn to:

  • Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology
  • Work with and store evidence in a properly configured forensic lab
  • Deploy an effective case management strategy to collect material, document findings, and archive results
  • Covertly investigate, triage, and work with remote data across the network
  • Recover partitions, INFO records, and deleted, wiped, and hidden files
  • Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools
  • Use forensic tools to uncover obscured code, file mismatches, and invalid signatures
  • Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools
  • Handle enterprise storage like RAIDS, SANs, NAS, and tape backup libraries
  • Recover vital data from handheld devices such as PDAs and cell phones

L'auteur - Chris J. Davis

Chris Davis, CISSP, of Texas Instruments, leverages practical experience from a global corporate environment. Mr. Davis has managed worldwide teams in security architecture, design, and product management. Mr. Davis has trained and presented at Blazck Hat, ISSA, CISA, ConSecWest, McCombs School of Business, 3GSM World Congress, and others in areas including advanced computer forensic analysis of various platforms and devices, information security, and hardware security design. His contributions include projects for Gartner, Harvard, SANS, CIS, and the McCombs School of Business. He has enjoyed positions at eForensics, Cisco Systems, Austin Microsoft Technology Center, and currently Texas Instruments. Mr. Davis was a US Navy Submariner on the USS Nebraska and Submarine NR-1. He holds a bachelor's degree in Nuclear Engineering from Thomas Edison, and a master's in Business from the University of Texas at Austin.

L'auteur - Aaron Philipp

David Cowen, CISSP, is a sr. consultant at Fios, Inc. Mr. Cowen has extensive experience and training in security research, application security testing, penetration testing, and computer forensic analysis in both computer and telecommunications systems and software. He has conducted forensic investigations, developed methodologies for use by incident response teams, and managed teams of forensic consultants. As a sr. consultant for Fios, he has served as an expert witness and consultant in a large variety of legal matters, ranging from internal investigations to anti-trust lawsuits.

L'auteur - David Cowen

Aaron Philipp, CISSP, has extensive experience in the field of forensics. He was the team lead in the Forensics and Survivability Research group at the McCombs School of Business, University of Texas at Austin. He holds a patent in the field of web server surviv-ability. He has consulting experience with U.S.- and foreign-based companies, and in performing network architecture design, cryptographic consultation, penetration testing, and incident response. He also has performed litigation support and contributed expert witness knowledge in multiple court cases, on levels ranging from civil to federal criminal. In addition, he has spoken at several conferences (Black Hat 2002, FBI Infra-guard, and more) on the topics of forensic investigation and toolkits, intrusion detection, and hacker methodologies. He holds a BS in Computing Science from the University of Texas at Austin.

Sommaire

  • Preparing for an Incident
    • The Forensics Process
    • Computer Fundamentals
    • Forensic Lab Environment Preparation
  • Collecting the Evidence
    • Forensically Sound Evidence Collection
    • Remote Investigations and Collections
  • Forensic Investigation Techniques
    • Microsoft Windows Systems Analysis
    • Linux Analysis
    • Macintosh Analysis
    • Defeating Anti-Forensic Techniques
    • Enterprise Storage Analysis
    • E-mail Analysis
    • Tracking User Activity
    • Cell Phone and PDA Analysis
  • Presenting Your Findings
    • Documenting the Investigation
    • The Justice System
  • Appendixes
    • Forensic Forms and Checklists
    • Understanding Legal Concerns
    • The Digital Evidence Legal Process
    • Searching Techniques
    • The Investigator's Toolkit
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Mc Graw-Hill - Osborne
Auteur(s) Chris J. Davis, Aaron Philipp, David Cowen
Collection Security
Parution 10/01/2005
Nb. de pages 444
Format 19 x 23
Couverture Broché
Poids 774g
Intérieur Noir et Blanc
EAN13 9780072256758
ISBN13 978-0-07-225675-8

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription