Computer and Intrusion Forensics and over 2 million other books are available for Amazon Kindle . Learn more
FREE Delivery in the UK.
Only 1 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Computer and Intrusion Forensics (Artech House computer security series) Hardcover – 31 Mar 2003

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
"Please retry"
£44.12 £18.98

Product details

Inside This Book (Learn More)
First Sentence
"Computers undeniably make a large part of human activity faster, safer, and more interesting." Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) 1 review
8 of 8 people found the following review helpful
Good Process Overview 20 Jun 2003
By Brian Carrier - Published on
Format: Hardcover
The "Computer and Intrusion Forensics" book is a good high-level overview of the digital forensic process. It contains chapters that will appeal to all types of new investigators who will need to deal with computer-related incidents, including law enforcement, corporate investigators, internal audit teams, and corporate incident teams. A strong International overview of the legal issues are also given for the United States, Europe, and Australia.
This book provides a good overview of tool techniques, but does not give many details on how the techniques would actually be done with any tool. A detailed overview of three tools are given, but two of them are available to law enforcement only. The reader will finish this book with a solid understanding of the process that occurs during a computer investigation, but will still need additional books or training to start performing an investigation.
The chapter on fraud is very informative, as the topic is not covered in other digital forensic books and the skills will likely be helpful for most investigators in the future. The "Computer Forensics in Law Enforcement and National Security" chapter describes the investigation process that any investigator would find useful, not just law enforcement as the title suggests. The "Intrusion Detection and Intrusion Forensics" chapter gives an overview of Intrusion Detection Systems and Logging, but little is mentioned on how to confirm an intrusion while minimizing the amount of evidence that is modified.
This book will be useful as a first book to a new investigator who is looking to learn about the digital forensic process. This book will also be useful for technical managers and supervisors who will need to understand what their investigators are doing.
Was this review helpful? Let us know