- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The most comprehensive and current computer forensics handbook explains today's leading tools and investigation techniques. Hacking Exposed Computer Forensics, Third Edition reveals how to identify and investigate computer crimes of all types, and explains how to construct a high-tech forensics lab, collect prosecutable evidence, discover email and system file clues, track wireless activity, and recover obscured documents. You'll learn how to recreate the path of the attacker, access a variety of devices, gather evidence, communicate with attorneys about their investigations, and prepare reports. In addition to a top-down update of the content, the book features several all-new chapters on the topics of cloud forensics, malware analysis, and laws and regulations in the European Union. The Hacking Exposed brand is synonymous with practical get-the-job-done tips for security practitioners. Threats to information security are more virulent today than ever before-this new edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest digital forensics cases ever seen. Features three completely new chapters on cloud forensics, malware analysis, and laws and regulations in the European Union with information on data restrictions concerning international investigationsExplains how to restore deleted documents, partitions, user activities, and file systemsDetails techniques for unlocking clues stored in mobile devicesCovers how to analyze evidence gathered from Windows, Linux, and Mac systems
Contents
Part IChapter 1: The Forensics ProcessChapter 2: Computer FundamentalsChapter 3: Forensic Lab Environment PreparationPart II: Collecting the EvidenceChapter 4: Forensically Sound Evidence CollectionChapter 5: Enterprise Forensic CollectionsPart III: Forensic AnalysisChapter 6: MalwareChapter 7: Microsoft Windows Systems AnalysisChapter 8: Linux AnalysisChapter 9: Macintosh AnalysisChapter 10: Cloud AnalysisChapter 11: Memory AnalysisChapter 12: Defeating Anti-Forensic TechniquesChapter 13: Enterprise Server and Storage AnalysisChapter 14: Email AnalysisChapter 15: Internet History AnalysisChapter 16: Mobile ForensicsPart IV: Presenting Your FindingsChapter 17: Documenting the InvestigationChapter 18: Investigations in the US Legal SystemChapter 19: Investigations in the Euro Legal SystemChapter 20: Investigations Between Legal SystemsPart V: Advanced ForensicsChapter 21: External Device AnalysisChapter 22: Tracking the CloudChapter 23: Enterprise NetworksChapter 24: Server Side Application ForensicsChapter 25: Source Code AnalysisAppendix A: Searching TechniquesNER(01): WOW