Cyber crime investigator's field guide

The movement toward miniaturized and mobile computing has created more opportunity for cyber thieves. To respond effectively, IT security professionals need a resource that combines the understanding of investigative techniques with the technical knowledge of cyberspace. Cyber Crime Investigator...

Full description

Bibliographic Details
Main Author: Middleton, Bruce
Format: eBook
Language:English
Published: Boca Raton Auerbach Publications 2005
Edition:2nd ed
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02749nmm a2200517 u 4500
001 EB001916100
003 EBX01000000000000001079002
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780203005231 
020 |a 0849327687 
020 |a 9781420031324 
020 |a 9780849327681 
020 |a 9786610164400 
020 |a 1420031325 
020 |a 0203005236 
020 |a 1138415448 
020 |a 9781138415447 
050 4 |a HV8079.C65 
100 1 |a Middleton, Bruce 
245 0 0 |a Cyber crime investigator's field guide  |c Bruce Middleton 
246 3 1 |a Cybercrime investigator's field guide 
250 |a 2nd ed 
260 |a Boca Raton  |b Auerbach Publications  |c 2005 
300 |a xiv, 279 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
505 0 |a Book Cover; Title; Copyright; Contents; About The Author; Preface; Chapter 1 The Initial Contact; Chapter 2 Client Site Arrival; Chapter 3 Evidence Collection Procedures; Chapter 4 Evidence Collection And Analysis Tools; Chapter 5 Accessdata's Forensic Tool Kit; Chapter 6 Guidance Software's Encase; Chapter 7 Ilook Investigator; Chapter 8 Password Recovery; Chapter 9 Questions And Answers By Subject Area; Chapter 10 Recommended Reference Materials; Chapter 11 Case Study; Appendix A Glossary; Appendix B Port Numbers Used By Malicious Trojan Horse Programs; Appendix C Attack Signatures 
653 |a Criminalité informatique / Enquêtes / Guides, manuels, etc 
653 |a Computer crimes / Investigation / fast 
653 |a Computer crimes / Investigation / Handbooks, manuals, etc 
653 |a LAW / Forensic Science / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
776 |z 9780429074813 
776 |z 1466536675 
776 |z 9781466536678 
776 |z 0203005236 
776 |z 0429074816 
776 |z 9780203005231 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781420031324/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 363.25/968 
082 0 |a 364.1 
520 |a The movement toward miniaturized and mobile computing has created more opportunity for cyber thieves. To respond effectively, IT security professionals need a resource that combines the understanding of investigative techniques with the technical knowledge of cyberspace. Cyber Crime Investigator's Field Guide, Second Edition provides an investigative framework, demonstrates the knowledge of how cyberspace really works, and explains the tools needed to pursue cyber criminals. This volume provides the details of investigating computer crime from soup to nuts. It covers the entire investigative p