Windows forensics the field guide for conducting corporate computer investigations
An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime. Whether you are contemplating a career...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
Indianapolis, IN
Wiley Publishing
2006
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000ntm#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-368226 | ||
005 | 201842310408 | ||
008 | 190318t 2006INU ag# ##001 ENG#D | ||
020 | # | # | |a 9780470038628 |q paperback |
040 | # | # | |a DLC |d UiTM |e rda |
090 | 0 | 0 | |a HV8079.C65 |b S84 2006 |
100 | 1 | # | |a Steel, Chad |c 1975- |e author |
245 | 1 | 0 | |a Windows forensics |b the field guide for conducting corporate computer investigations |c Chad Steel |
264 | # | 1 | |a Indianapolis, IN |b Wiley Publishing |c 2006 |
264 | # | 4 | |c ©2006 |
300 | # | # | |a xvii, 382 pages : |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references and index |
520 | # | # | |a An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime. Whether you are contemplating a career in this growing field or are already an analyst in a Unix/Linux environment, this book prepares you to combat computer crime in the Windows world. Here are the tools to help you recover sabotaged files, track down the source of threatening e-mails, investigate industrial espionage, and expose computer criminals. * Identify evidence of fraud, electronic theft, and employee Internet abuse * Investigate crime related to instant messaging, Lotus Notes(r), and increasingly popular browsers such as Firefox(r) * Learn what it takes to become a computer forensics analyst * Take advantage of sample forms and layouts as well as case studies * Protect the integrity of evidence * Compile a forensic response toolkit * Assess and analyze damage from computer crime and process the crime scene * Develop a structure for effectively conducting investigations * Discover how to locate evidence in the Windows Registry |
526 | 0 | # | |a ITT593 |b CS245 |5 CS |
526 | 0 | # | |a Reverse Engineering Malware Analysis |b Bachelor of Computer Science(Hons) Data Communication & Networking |5 Fakulti Sains Komputer Dan Matematik |
650 | # | 0 | |a Computer crimes |x Methodology |x Investigation |z United States |
650 | # | 0 | |a Microsoft Windows (Computer file) |x Security measures |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Internet |x Security measures |
650 | # | 0 | |a Computer networks |x Security measures |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=368226 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |