Computer forensics incident response essentials

"Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encry...

Full description

Bibliographic Details
Main Author: Kruse, Warren G.
Other Authors: Heiser, Jay G.
Format: eBook
Language:English
Published: Boston, MA Addison-Wesley 2001
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03236nmm a2200553 u 4500
001 EB001914839
003 EBX01000000000000001077741
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780672333989 
020 |a 0672333988 
020 |a 9781282692022 
020 |a 9786612692024 
020 |a 128269202X 
050 4 |a QA76.9.A25 
100 1 |a Kruse, Warren G. 
245 0 0 |a Computer forensics  |b incident response essentials  |c Warren G. Kruse II, Jay G. Heiser 
260 |a Boston, MA  |b Addison-Wesley  |c 2001 
300 |a xiii, 392  |b illustrations 
505 0 |a Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system 
505 0 |a Includes bibliographical references (pages 381-384) and index 
653 |a Computer security 
653 |a Criminalistique 
653 |a Forensic sciences / fast 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a forensic science / aat 
653 |a Computer networks / Security measures / fast 
653 |a Computercriminaliteit / gtt 
653 |a Computerbeveiliging / gtt 
653 |a Forensic Sciences 
653 |a Gerechtelijke technologie / gtt 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Computer security / fast 
653 |a Computer Security 
653 |a Forensic sciences / http://id.loc.gov/authorities/subjects/sh90001487 
700 1 |a Heiser, Jay G. 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 
776 |z 9780201707199 
776 |z 0201707195 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780672333989/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 500 
082 0 |a 363.25968 
082 0 |a 005.8 
520 |a "Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--Jacket