Real Digital Forensics
38%
off

Real Digital Forensics : Computer Security and Incident Response

By (author) Keith J. Jones , By (author) Richard Bejtlich , By (author) Curtis W. Rose

US$39.98US$64.86

You save US$24.88

Free delivery worldwide

Available
Dispatched in 2 business days

When will my order arrive?

You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting. A(c) Copyright Pearson Education. All rights reserved.

show more
  • Mixed media product | 688 pages
  • 178 x 234 x 34mm | 997.9g
  • 01 Oct 2005
  • Pearson Education (US)
  • Addison-Wesley Educational Publishers Inc
  • New Jersey
  • English
  • 0321240693
  • 9780321240699
  • 202,788

Other books in this category

Other people who viewed this bought:

Author Information

Keith Jones (Alexandria, VA) heads the forensics practice at Red Cliff Consulting. Former military intelligence officer Richard Bejtlich (Manassas Park, VA) is a security engineer at ManTech International Corporation's Computer Forensics and Intrusion Analysis division. A recognized authority on computer security, he has extensive experience with network security monitoring, incident response, and forensics. Curtis Rose (Alexandria, VA) is vice president of Red Cliff and an industry-recognized expert in computer security with more than eighteen years experience in investigations, computer forensics, technical, and information security.

show more

Back cover copy

You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: Responding to live incidents in both Windows and Unix environmentsDetermining whether an attack has actually occurredAssembling a toolkit you can take to the scene of a computer-related crimeAnalyzing volatile data, nonvolatile data, and files of unknown originSafely performing and documenting forensic duplicationsCollecting and analyzing network-based evidence in Windows and Unix environmentsReconstructing Web browsing, e-mail activity, and Windows Registry changesTracing domain name ownership and the source of e-mailsDuplicating and analyzing the contents of PDAs and flash memory devicesThe accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting. (c) Copyright Pearson Education. All rights reserved.

show more