Terrorist attacks are no longer relegated to airports and federal buildings. Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book/CD package provides a complete overview of computer forensics from its definition to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminal. The book focuses on "solving the crime" rather than information security.
KEY FEATURES
* Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks
* Case studies and vignettes of actual computer crimes
* Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation Of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tacking; The Individual Exposed; Case Studies and Vignettes
* CD includes tools, presentations, and demos of the latest computer forensics software, including partition images from The Forensic Challenge
On the CD-ROM:
The following forensic tools, demos, and presentations are included on the accompanying CD-ROM.
The Forensics Challenge Partition Images
- The HoneyNet Project
FW-1 Specific Network Intrusion Detector
- Lance Spitzner
RecoverNT v3.5(demo)
Recover98 v3.5 (demo)
FILERECOVERY for Windows v2.1(demo)
PHOTORECOVERY for Digital Media 1.5(demo)
- LC Technology International, Inc.
The Coroner's Toolkit (TCT)
- Dan Farmer and Wietse Venema
Free Hex Editor v1.1
- Raihan Kibria
WinHex 10.45(demo)
- X-Ways Software Technology AG
TCPurify 0.9.6
- Ethan Blanton
Protect2000 Security Suite (product presentation)
- Computer Security Products Inc.
Mazu Enforcer (product presentation)
- Mazu Networks
"synopsis" may belong to another edition of this title.
John Vacca served as a computer security official with NASA, and he has written over 35 books on computer-related topics, including SATELLITE ENCRYPTION, NET PRIVACY, and ELECTRONIC COMMERCE, Third Edition.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Hawking Books, Edgewood, TX, U.S.A.
Condition: Very Good. Very Good Condition. Five star seller - Buy with confidence! Seller Inventory # X1584500182X2
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00078760573
Quantity: 3 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. 1st. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 3766580-75
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 1st. Used book that is in clean, average condition without any missing pages. Seller Inventory # 3766579-6
Quantity: 1 available
Seller: Half Price Books Inc., Dallas, TX, U.S.A.
paperback. Condition: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_421927723
Quantity: 1 available
Seller: HPB Inc., Dallas, TX, U.S.A.
paperback. Condition: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_437624840
Quantity: 1 available
Seller: Wonder Book, Frederick, MD, U.S.A.
Condition: Good. Good condition. With CD! A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Seller Inventory # F10I-01634
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR004720427
Quantity: 1 available
Seller: AwesomeBooks, Wallingford, United Kingdom
Paperback. Condition: Very Good. Computer Forensics: Computer Crime Scene (Networking Series) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 7719-9781584500186
Quantity: 1 available
Seller: Bahamut Media, Reading, United Kingdom
Paperback. Condition: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 6545-9781584500186
Quantity: 1 available