Cyber crime investigator's field guide
The movement toward miniaturized and mobile computing has created more opportunity for cyber thieves. To respond effectively, IT security professionals need a resource that combines the understanding of investigative techniques with the technical knowledge of cyberspace. Cyber Crime Investigator...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Boca Raton
Auerbach Publications
2005
|
Edition: | 2nd ed |
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Includes bibliographical references and index
- Book Cover; Title; Copyright; Contents; About The Author; Preface; Chapter 1 The Initial Contact; Chapter 2 Client Site Arrival; Chapter 3 Evidence Collection Procedures; Chapter 4 Evidence Collection And Analysis Tools; Chapter 5 Accessdata's Forensic Tool Kit; Chapter 6 Guidance Software's Encase; Chapter 7 Ilook Investigator; Chapter 8 Password Recovery; Chapter 9 Questions And Answers By Subject Area; Chapter 10 Recommended Reference Materials; Chapter 11 Case Study; Appendix A Glossary; Appendix B Port Numbers Used By Malicious Trojan Horse Programs; Appendix C Attack Signatures