Hacking Exposed Computer Forensics
Secrets and Solutions
Chris J. Davis, Aaron Philipp, David Cowen - Collection Security
Résumé
Learn secrets and Strategies for investigating computer crime
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.
Inside, you'll learn to:
- Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology
- Work with and store evidence in a properly configured forensic lab
- Deploy an effective case management strategy to collect material, document findings, and archive results
- Covertly investigate, triage, and work with remote data across the network
- Recover partitions, INFO records, and deleted, wiped, and hidden files
- Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools
- Use forensic tools to uncover obscured code, file mismatches, and invalid signatures
- Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools
- Handle enterprise storage like RAIDS, SANs, NAS, and tape backup libraries
- Recover vital data from handheld devices such as PDAs and cell phones
L'auteur - Chris J. Davis
Chris Davis, CISSP, of Texas Instruments, leverages practical experience from a global corporate environment. Mr. Davis has managed worldwide teams in security architecture, design, and product management. Mr. Davis has trained and presented at Blazck Hat, ISSA, CISA, ConSecWest, McCombs School of Business, 3GSM World Congress, and others in areas including advanced computer forensic analysis of various platforms and devices, information security, and hardware security design. His contributions include projects for Gartner, Harvard, SANS, CIS, and the McCombs School of Business. He has enjoyed positions at eForensics, Cisco Systems, Austin Microsoft Technology Center, and currently Texas Instruments. Mr. Davis was a US Navy Submariner on the USS Nebraska and Submarine NR-1. He holds a bachelor's degree in Nuclear Engineering from Thomas Edison, and a master's in Business from the University of Texas at Austin.
L'auteur - Aaron Philipp
David Cowen, CISSP, is a sr. consultant at Fios, Inc. Mr. Cowen has extensive experience and training in security research, application security testing, penetration testing, and computer forensic analysis in both computer and telecommunications systems and software. He has conducted forensic investigations, developed methodologies for use by incident response teams, and managed teams of forensic consultants. As a sr. consultant for Fios, he has served as an expert witness and consultant in a large variety of legal matters, ranging from internal investigations to anti-trust lawsuits.
L'auteur - David Cowen
Aaron Philipp, CISSP, has extensive experience in the field of forensics. He was the team lead in the Forensics and Survivability Research group at the McCombs School of Business, University of Texas at Austin. He holds a patent in the field of web server surviv-ability. He has consulting experience with U.S.- and foreign-based companies, and in performing network architecture design, cryptographic consultation, penetration testing, and incident response. He also has performed litigation support and contributed expert witness knowledge in multiple court cases, on levels ranging from civil to federal criminal. In addition, he has spoken at several conferences (Black Hat 2002, FBI Infra-guard, and more) on the topics of forensic investigation and toolkits, intrusion detection, and hacker methodologies. He holds a BS in Computing Science from the University of Texas at Austin.
Sommaire
- Preparing for an Incident
- The Forensics Process
- Computer Fundamentals
- Forensic Lab Environment Preparation
- Collecting the Evidence
- Forensically Sound Evidence Collection
- Remote Investigations and Collections
- Forensic Investigation Techniques
- Microsoft Windows Systems Analysis
- Linux Analysis
- Macintosh Analysis
- Defeating Anti-Forensic Techniques
- Enterprise Storage Analysis
- E-mail Analysis
- Tracking User Activity
- Cell Phone and PDA Analysis
- Presenting Your Findings
- Documenting the Investigation
- The Justice System
- Appendixes
- Forensic Forms and Checklists
- Understanding Legal Concerns
- The Digital Evidence Legal Process
- Searching Techniques
- The Investigator's Toolkit
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw-Hill - Osborne |
Auteur(s) | Chris J. Davis, Aaron Philipp, David Cowen |
Collection | Security |
Parution | 10/01/2005 |
Nb. de pages | 444 |
Format | 19 x 23 |
Couverture | Broché |
Poids | 774g |
Intérieur | Noir et Blanc |
EAN13 | 9780072256758 |
ISBN13 | 978-0-07-225675-8 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet