Praise for Forensic Discovery
"Farmer and Venema do for digital archaeology what Indiana Jones did for historical archaeology. Forensic Discovery unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder. I highly recommend reading this book."
--Richard Bejtlich, TaoSecurity
Praise for Real Digital Forensics
" Real Digital Forensics is as practical as a printed book can be. In a very methodical fashion, the authors cover live response (Unix, Windows), network-based forensics following the NSM model (Unix, Windows), forensics duplication, common forensics analysis techniques (such as file recovery and Internet history review), hostile binary analysis (Unix, Windows), creating a forensics toolkit and PDA, flash and USB drive forensics. The book is both comprehensive and in-depth; following the text and trying the investigations using the enclosed DVD definitely presents an effective way to learn forensic techniques."
--Anton Chuvakin, LogLogic
Praise for File System Forensic Analysis
"Carrier has achieved what few technical authors do, namely a clear explanation of highly technical topics that retains a level of detail making it valuable for the long term. For anyone looking seriously at electronic forensics, this is a must have. File System Forensic Analysis is a great technical resource."
--Jose Nazario, Arbor Networks
The Computer Forensics Library
With the ever-increasing number of computer-related crimes, more and more professionals find themselves needing to conduct a forensics examination. But where to start? What if you don't have the time or resources to take a lengthy training course? We've assembled the works of today's leading forensics experts to help you dive into forensics, give you perspective on the big picture of forensic investigations, and arm you to handle the nitty-gritty technicalities of the toughest cases out there.
Forensic Discovery , the definitive guide, presents a thorough introduction to the field of computer forensics. Authors Dan Farmer and Wietse Venema cover everything from file systems to memory andkernel hacks and malware. They expose many myths about forensics that can stand in the way of success. This succinct book will get you started with the realities of forensics.
Real Digital Forensics allows you to dive right in to an investigation and learn by doing. Authors Keith J. Jones, Richard Bejtlich, and Curtis W. Rose walk you through six detailed, highly realistic investigations and provide a DVD with all the data you need to follow along and practice. Once you understand the big picture of computer forensics, this book will show you what a Unix or Windows investigation really looks like.
File System Forensic Analysis completes the set and provides the information you need to investigate a computer's file system. Most digital evidence is stored within the computer's file system, so many investigations will inevitably lead there. But understanding how the file system works is one of the most technically challenging concepts for digital investigators. With this book, expert Brian Carrier closes out the set by providing details about file system analysis available nowhere else.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
About the Author:
Keith J. Jones leads the computer forensics and electronic evidence discovery practices at Red Cliff Consulting. Formerly Foundstone's director of incident response and computer forensics, his book The Anti-Hacker Tool Kit (McGraw-Hill Osborne, 2002) is the definitive guide to securing critical applications.
Richard Bejtlich is a former Air Force intelligence officer, and is founder of TaoSecurity, a network security monitoring consultancy. He wrote the Tao of Network Security Monitoring (Addison-Wesley, 2005) and Extrusion Detection (Addison-Wesley, 2006).
Curtis W. Rose, a former counterintelligence special agent, is an executive vice president at Red Cliff Consulting where he leads research and development efforts and special projects, and where he provides support to criminal investigations and civil litigation. He was a contributing author or technical editor for several security books, including The Anti-Hacker Tool Kit, Network Security: The Complete Reference (McGraw-Hill Osborne, 2002), and Incident Response: Investigating Computer Crime, Second Edition (McGraw-Hill Osborne, 2002).
Dan Farmer is author of a variety of security programs and papers. He is currently chief technical officer of Elemental Security, a computer security software company. Together he and Wietse Venema, have written many of the world's leading information security and forensics packages, including the SATAN network security scanner and the Coroner's Toolkit.
Wietse Venema has written some of the world's most widely used software, including TCP Wrapper and the Postfix mail system. He is currently a research staff member at IBM Research. Together, he and Dan Farmer have written many of the world's leading information security and forensics packages, including the SATAN network security scanner and the Coroner's Toolkit.
Brian Carrier has authored several leading computer forensic tools, including The Sleuth Kit (formerly The @stake Sleuth Kit) and the Autopsy Forensic Browser. He has authored several peer-reviewed conference and journal papers and has created publicly available testing images for forensic tools. Currently pursuing a Ph.D. in computer science and digital forensics at Purdue University, he is also a research assistant at the Center for Education and Research in Information Assurance and Security (CERIAS) there. He formerly served as a research scientist at @stake and as the lead for the @stake Response Team and Digital Forensic Labs. Carrier has taught forensics, incident response, and file systems at SANS, FIRST, the @stake Academy, and SEARCH.
Brian Carrier's Web site, http://www.digital-evidence.org, contains book updates and up-to-date URLs from the book's references.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Buchbeschreibung Addison Wesley, 2007. Paperback. Buchzustand: Acceptable. one of the book previously may have been exposed to water (some marks remain but is usable) Acceptable items may shows sign of prior usage, pages stained or discoloured from the outside. Covers/corners and spine may be worn/bent, may contain stickers/stamps or previous owners name (May contain gift note). For detailed description please contact seller. Buchnummer des Verkäufers mon0001290390
Buchbeschreibung Addison-Wesley Professional, 2007. Paperback. Buchzustand: Good. Domestic Shipping Only, Item may show signs of shelf wear. Pages may include limited notes and highlighting. Includes supplemental or companion materials if applicable. Access codes may or may not work. Connecting readers since 1972. Customer service is our top priority. Buchnummer des Verkäufers mon0000125199
Buchbeschreibung Addison-Wesley Professional, 2007. Paperback. Buchzustand: Used: Good. Buchnummer des Verkäufers SONG0321525647
Buchbeschreibung Addison-Wesley Professional, 2007. Buchzustand: Good. A+ Customer service! Satisfaction Guaranteed! Book is in Used-Good condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain limited notes and highlighting. Buchnummer des Verkäufers 0321525647-2-4
Buchbeschreibung Addison-Wesley Professional, 2007. Paperback. Buchzustand: Good. 1. Ships with Tracking Number! INTERNATIONAL WORLDWIDE Shipping available. May not contain Access Codes or Supplements. Buy with confidence, excellent customer service!. Buchnummer des Verkäufers 0321525647