Incident Response & Computer Forensics, 2nd Ed.
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.
What people are saying - Write a review
User Review - Overstock.com
Highly recommended seller Read full review
Other editions - View all
application attacker audit backups best evidence binary bytes Chapter checksums cmd.exe collected command line Computer Forensics computer security computer security incident configuration file connection create CSIRT debugfs deleted files determine device disk document drwxr-xr-x employee EnCase evidence custodian example executed Figure file descriptor file system forensic duplication forensic workstation GENGIS grep hard drive ICMP identify incident response initial response interface Internet investigation IP address kernel law enforcement Linux LKMs log files logon netcat netstat network monitoring network traffic network-based operating system option organization output packets partition password perform port Registry remote Response & Computer rogue root 0 Apr root root root@localhost router running SafeBack SCSI server sniffer storage stored strace string searches syslog system administrator tcpdump telnet time/date stamps toolkit Unix systems user account utility victim system web server Windows systems
Architectural Design of Multi-agent Systems: Technologies and Techniques
No preview available - 2007
Digital Evidence and Computer Crime: Forensic Science, Computers and the ...
Limited preview - 2004