How would your organization
cope with a cyber attack? Pinpoint and close vulnerabilities using
effective computer forensics! This pocket guide illustrates the
technical complexities involved in computer forensics, and shows
managers what makes the discipline relevant to their organization. For
technical staff, the book offers an invaluable insight into the key
processes and procedures that are required.
Book Description:
Using personal computers as
their weapons, hackers and criminals (some only 11 years old) have
attacked the Internet, government agencies, financial companies, small
businesses, and the credit card accounts of unsuspecting individuals.
This completely updated book/CD package provides a complete overview of
computer forensics from information security issues to "crime scene
investigation," seizure of data, determining the "fingerprints" of the
crime, and tracking down the criminals.
Book Description:
The Basics of Digital
Forensics provides a foundation for people new to the digital forensics
field. This book teaches you how to conduct examinations by discussing
what digital forensics is, the methodologies used, key technical
concepts and the tools needed to perform examinations. Details on
digital forensics for computers, networks, cell phones, GPS, the cloud,
and Internet are discussed.
Book Description:
The leading introduction to
computer crime and forensicsis now fully updated to reflect today's
newest attacks, laws, and investigatory best practices. Packed with new
case studies, examples, and statistics, Computer Forensics and Cyber
Crime, Third Edition adds up-to-the-minute coverage of smartphones,
cloud computing, GPS, Mac OS X, Linux, Stuxnet, cyberbullying,
cyberterrorism, search and seizure, online gambling, and much more.
Book Description:
Digital Forensics with Open
Source Tools is the definitive book on investigating and analyzing
computer systems and media using open source tools. The book is a
technical procedural guide, and explains the use of these tools on Linux
and Windows systems as a platform for performing computer forensics.
Both well known and novel forensic methods are demonstrated using
command-line and graphical open source computer forensic tools for
examining a wide range of target systems and artifacts.
Book Description:
With the increase of
electronic crimes and the need to constantly audit the proper use of
resources, companies need qualified professionals and appropriate tools
to carry out these activities. The FTK platform, with the ability to
collect and analyze digital evidence quickly and with integrity, is a
great solution to help professionals achieve these goals. It is
extremely useful for conducting digital investigations, helping you
conduct a thorough investigation through a single tool and ensure the
integrity of evidence.
Book Description:
The Syngress Digital
Forensics Field Guides series includes companions for any digital and
computer forensic investigator and analyst. Each book is a "toolkit"
with checklists for specific tasks, case studies of difficult
situations, and expert analyst tips. This compendium of tools for
computer forensics analysts and investigators is presented in a succinct
outline format with cross-references to supplemental appendices.
Book Description:
To reduce the risk of digital
forensic evidence being called into question in judicial proceedings,
it is important to have a rigorous methodology and set of procedures for
conducting digital forensic investigations and examinations. Digital
forensic investigation in the cloud computing environment, however, is
in infancy due to the comparatively recent prevalence of cloud
computing. Cloud Storage Forensics presents the first evidence-based
cloud forensic framework.
Book Description:
'This is a must-have work for
anybody in information security, digital forensics, or involved with
incident handling. As we move away from traditional disk-based analysis
into the interconnectivity of the cloud, Sherri and Jonathan have
created a framework and roadmap that will act as a seminal work in this
developing field.' Dr. Craig S. Wright (GSE), Asia Pacific Director at
Global Institute for Cyber Security + Research. On the Internet, every
action leaves a markin routers, firewalls, web proxies, and within
network traffic itself.
Book Description:
Because it's so large and
unregulated, the Internet is a fertile breeding ground for all kinds of
scams and schemes. Usually it's your credit card number they're after,
and they won't stop there. Not just mere annoyances, these scams are
real crimes, with real victims. Now, thanks to Internet Forensics from
O'Reilly, there's something you can do about it. This practical guide to
defending against Internet fraud gives you the skills you need to
uncover the origins of the spammers, con artists, and identity thieves
that plague the Internet.
Book Description:
Dissecting the dark side of
the Internet with its infectious worms, botnets, rootkits, and Trojan
horse programs (known as malware) is a treaterous condition for any
forensic investigator or analyst. Written by information security
experts with real-world investigative experience, Malware Forensics
Field Guide for Windows Systems is a"tool" with checklists for specific
tasks, case studies of difficult situations, and expert analyst tips.
Book Description:
An authoritative guide to
investigating high-technology crimesInternet crime is seemingly ever on
the rise, making the need for a comprehensive resource on how to
investigate these crimes even more dire. This professional-level
book--aimed at law enforcement personnel, prosecutors, and corporate
investigators--provides you with the training you need in order to
acquire the sophisticated skills and software solutions to stay one step
ahead of computer criminals.
No comments:
Post a Comment