Buy Used
+ £2.80 UK delivery
Used: Very Good | Details
Condition: Used: Very Good
Comment: Expedited shipping available on this book. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions: Computer Forensics Secrets and Solutions Paperback – 1 Dec 2004

4.0 out of 5 stars 2 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
£22.36 £1.19
click to open popover

Special Offers and Product Promotions

Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.

Product details

  • Paperback: 480 pages
  • Publisher: McGraw-Hill Osborne (1 Dec. 2004)
  • Language: English
  • ISBN-10: 0072256753
  • ISBN-13: 978-0072256758
  • Product Dimensions: 18.5 x 2.4 x 22.9 cm
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: 2,233,438 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

Learn the secrets and strategies for investigating computer crime

Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You’ll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It’s all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you’ll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies.

Digital sleuthing techniques that will withstand judicial scrutiny

Inside, you’ll learn to:

  • Plan and prepare for all stages of an investigation using the proven Hacking Exposed methodology
  • Work with and store evidence in a properly configured forensic lab
  • Deploy an effective case management strategy to collect material, document findings, and archive results
  • Covertly investigate, triage, and work with remote data across the network
  • Recover partitions, INFO records, and deleted, wiped, and hidden files
  • Acquire, authenticate, and analyze evidence from Windows, UNIX, and Macintosh systems using the latest hardware and software tools
  • Use forensic tools to uncover obscured code, file mismatches, and invalid signatures
  • Extract client and Web-based email artifacts using Email Examiner, EnCase, Forensic Toolkit, and open source tools
  • Handle enterprise storage like RAIDs, SANs, NAS, and tape backup libraries
  • Recover vital data from handheld devices such as PDAs and cell phones

About the Authors: Chris Davis, CISSP, is a Computer Forensics Examiner for Texas Instruments. He has trained and presented at Black Hat, ISSA, CISA, ConSecWest, McCombs School of Business, PlanetPDA, and 3GSM World Congress.

Aaron Philipp, CISSP, is the co-founder of Affect Consulting. He has taught classes at Black Hat, McCombs School of Business - UT Austin, and various military organizations.

Dave Cowen, CISSP, Senior Consultant at Fios, has extensive experience in security research, application security testing, penetration testing, and computer forensic analysis. He is an expert witness and a regular speaker on computer forensics.

About the Author

Chris Davis, (Carrollton, TX) CISSP, is a Computer Forensics Examiner for Texas Instruments.

Aaron Philipp, (Austin, TX) CISSP, has extensive experience in the field of Forensics.

Dave Cowen, (Richardson, TX) CISSP, has extensive experience and training in security research, application security testing, penetration testing and computer forensic analysis in both computer and telecommunications systems and software.

Customer Reviews

4.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See both customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
I am a systems administrator and I thought this may give me some hints and tips when recovering failed systems and finding out what (or who) went wrong with the server, as opposed to just looking through a logfile.

After the first couple of chapters (good overviews of forensics process and computer hardware) this book seems to focus very heavily on the legal implications of computer forensics, and not the technical aspects. The legal focus is on the USA judicial system. The technical recommendations all seem to be focused around buying one piece of software, Encase, which is drummed into you on nearly every page.

As for the sub-title, 'Secrets & Solutions', there is very little to try at home or even in a basic test lab.

Also, the item description states that there is a CD-ROM in this book. There isn't.
Comment 21 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
great book and good seller
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on (beta) HASH(0x99a5f39c) out of 5 stars 9 reviews
15 of 18 people found the following review helpful
HASH(0x99aa9234) out of 5 stars Very Interesting Book 3 Dec. 2004
By Arthur Dexter - Published on
Format: Paperback
Coming from a system administration background, I found Hacking Exposed Computer Forensics to be very good book.

The book does a good job of filling you in with the background technical details as well as providing practical knowledge you can use on a day to day basis. In addition to serving as an accesible introduction to both the technical and legal sides of computer forensics, the book is a useful reference with many clear, detailed examples.

The computer side of the book offered advice on working with Windows, Linux, and Macintosh systems. I especially appreciated the section on Macs. Having worked primarily with Linux and Windows, I found the Mac details to be extremely interesting.

While I have not had to deal with the legal side of computer forensics, I found the legal sections to be interesting reading.

I would reccomend this book strongly to technical people whether or not they are interested in law enforcement, as it provides a good deal of information useful to system administrators as well as advanced users.
5 of 5 people found the following review helpful
HASH(0x99929684) out of 5 stars An excellent reference but... 9 May 2006
By akempo - Published on
Format: Paperback
for anyone conducting an investigation, this is the epitome of a textbook reference book hybrid. The book provides a good overview of the most popular tools on the market and how to effectively use them during the investigative process, as well as legal requirements for evidence handling and tracking.

One of the book's best features is also one of it's biggest weaknesses: if you don't have access to at least one of the software packages demonstrated in the book, the book's value decreases substantially. Although not said in so many words, the implication is that if you don't have one of these tools, your investigation will be much more difficult, if not impossible.

Given the dryness and specificity of the writing, although the book is wellwritten, I would have trouble recommending it to anyone not currently already doing that type of work.
7 of 8 people found the following review helpful
HASH(0x9a4f4498) out of 5 stars Excellent Explanations -- Very Easy to Use 25 April 2005
By Daniel Richardson - Published on
Format: Paperback
I work on the security team in a large company and use this as a key reference when working investigations. We're understaffed, and investigations isn't my only focus. When I found out about this book I was excited about the familiar look and feel of a series I've humbly learned much from. IMHO, this book is an outstanding compliment to the arsenal of tools I use when I'm asked to help with investigations. In particular, I like the short and concise legal information and the breadth of topics covered in a short volume. I feel a lot of though went into this because the layout helps me focus on important issues. The book covers so many topics like cell phones, Internet logs, eMail, and Macintosh systems to large storage RAIDS, NAS and SANS. Tools are also covered, including some I knew about, and some I don't know how I lived without before reading this. I feel much more confident handling cases I'm asked to help with.
7 of 9 people found the following review helpful
HASH(0x99936d74) out of 5 stars Focus on commercial tools 13 Jun. 2005
By Peter Van Eeckhoutte - Published on
Format: Paperback
I bought this book based upon the experience I had with other Hacking Exposed books... but this one has disappointed me

The examples are based on commercial tools only - while I'm certain that there are many open source tools available also.

The book contains more than 100 pages of forms and explanations of the legal process, which is nice, but not what I would have expected from a Hacking Exposed book
4 of 5 people found the following review helpful
HASH(0x99a0a3e4) out of 5 stars A VITAL reference book 28 Sept. 2005
By Paul DeVorak - Published on
Format: Paperback
This book has been an extremely valuable reference for me and my coworkers on any subject related to forensics that we have encountered in our investigations. This is the only book I've found that covers the laws of forensics as well as technical details of analysis. I strongly recommend this book to anyone that is involved in computer forensics.
Were these reviews helpful? Let us know