Windows forensics the field guide for conducting corporate computer investigations

An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime. Whether you are contemplating a career...

Full description

Saved in:
Bibliographic Details
Main Author: Steel, Chad 1975- (Author)
Format: Book
Published: Indianapolis, IN Wiley Publishing 2006
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000ntm#a2200000#i#4501
001 wils-368226
005 201842310408
008 190318t 2006INU ag# ##001 ENG#D
020 # # |a 9780470038628  |q paperback 
040 # # |a DLC  |d UiTM  |e rda 
090 0 0 |a HV8079.C65  |b S84 2006 
100 1 # |a Steel, Chad  |c 1975-  |e author 
245 1 0 |a Windows forensics  |b the field guide for conducting corporate computer investigations  |c Chad Steel 
264 # 1 |a Indianapolis, IN  |b Wiley Publishing  |c 2006 
264 # 4 |c ©2006 
300 # # |a xvii, 382 pages :  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references and index 
520 # # |a An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime. Whether you are contemplating a career in this growing field or are already an analyst in a Unix/Linux environment, this book prepares you to combat computer crime in the Windows world. Here are the tools to help you recover sabotaged files, track down the source of threatening e-mails, investigate industrial espionage, and expose computer criminals. * Identify evidence of fraud, electronic theft, and employee Internet abuse * Investigate crime related to instant messaging, Lotus Notes(r), and increasingly popular browsers such as Firefox(r) * Learn what it takes to become a computer forensics analyst * Take advantage of sample forms and layouts as well as case studies * Protect the integrity of evidence * Compile a forensic response toolkit * Assess and analyze damage from computer crime and process the crime scene * Develop a structure for effectively conducting investigations * Discover how to locate evidence in the Windows Registry 
526 0 # |a ITT593  |b CS245  |5 CS 
526 0 # |a Reverse Engineering Malware Analysis  |b Bachelor of Computer Science(Hons) Data Communication & Networking  |5 Fakulti Sains Komputer Dan Matematik 
650 # 0 |a Computer crimes  |x Methodology  |x Investigation  |z United States 
650 # 0 |a Microsoft Windows (Computer file)  |x Security measures 
650 # 0 |a Computer security 
650 # 0 |a Internet  |x Security measures 
650 # 0 |a Computer networks  |x Security measures 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=368226 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||