Book Cover; Title; Copyright; Contents; About The Author; Preface; Chapter 1 The Initial Contact; Chapter 2 Client Site Arrival; Chapter 3 Evidence Collection Procedures; Chapter 4 Evidence Collection And Analysis Tools; Chapter 5 Accessdata's Forensic Tool Kit; Chapter 6 Guidance Software's Encase; Chapter 7 Ilook Investigator; Chapter 8 Password Recovery; Chapter 9 Questions And Answers By Subject Area; Chapter 10 Recommended Reference Materials; Chapter 11 Case Study; Appendix A Glossary; Appendix B Port Numbers Used By Malicious Trojan Horse Programs; Appendix C Attack Signatures.
0
The movement toward miniaturized and mobile computing has created more opportunity for cyber thieves. To respond effectively, IT security professionals need a resource that combines the understanding of investigative techniques with the technical knowledge of cyberspace. Cyber Crime Investigator's Field Guide, Second Edition provides an investigative framework, demonstrates the knowledge of how cyberspace really works, and explains the tools needed to pursue cyber criminals. This volume provides the details of investigating computer crime from soup to nuts. It covers the entire investigative p.
OverDrive, Inc.
Cyber crime investigator's field guide.
0849327687
Cybercrime investigator's field guide
Computer crimes-- Investigation, Handbooks, manuals, etc.
Criminalité informatique-- Enquêtes, Guides, manuels, etc.