• RRP: £49.99
  • You Save: £8.66 (17%)
FREE Delivery in the UK.
Only 1 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Quantity:1
Real Digital Forensics: C... has been added to your Basket
+ £2.80 UK delivery
Used: Good | Details
Sold by rbmbooks
Condition: Used: Good
Comment: Used, good: average wear, reasonable shape, may have limited notes and/or highlighting. Delivered in 10-12 business days from the USA. Money-back guarantee.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Real Digital Forensics: Computer Security and Incident Response Paperback – 23 Sep 2005

4.4 out of 5 stars 9 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
£41.33
£34.67 £14.00
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
£41.33 FREE Delivery in the UK. Only 1 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.
click to open popover

Special Offers and Product Promotions


Frequently Bought Together

  • Real Digital Forensics: Computer Security and Incident Response
  • +
  • File System Forensic Analysis
Total price: £83.72
Buy the selected items together

Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.




Product details

  • Paperback: 688 pages
  • Publisher: Addison Wesley; Pap/Cdr edition (23 Sept. 2005)
  • Language: English
  • ISBN-10: 9780321240699
  • ISBN-13: 978-0321240699
  • ASIN: 0321240693
  • Product Dimensions: 17.8 x 4.3 x 23.4 cm
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Bestsellers Rank: 461,777 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

You can't succeed in the field of computer forensics without hands-on practice―and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice.

From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.

You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.

Inside, you will find in-depth information on the following areas:

  • Responding to live incidents in both Windows and Unix environments

  • Determining whether an attack has actually occurred

  • Assembling a toolkit you can take to the scene of a computer-related crime

  • Analyzing volatile data, nonvolatile data, and files of unknown origin

  • Safely performing and documenting forensic duplications

  • Collecting and analyzing network-based evidence in Windows and Unix environments

  • Reconstructing Web browsing, e-mail activity, and Windows Registry changes

  • Tracing domain name ownership and the source of e-mails

  • Duplicating and analyzing the contents of PDAs and flash memory devices

The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.


© Copyright Pearson Education. All rights reserved.

About the Author

Keith Jones (Alexandria, VA) heads the forensics practice at Red Cliff Consulting. Former military intelligence officer Richard Bejtlich (Manassas Park, VA) is a security engineer at ManTech International Corporation's Computer Forensics and Intrusion Analysis division. A recognized authority on computer security, he has extensive experience with network security monitoring, incident response, and forensics. Curtis Rose (Alexandria, VA) is vice president of Red Cliff and an industry-recognized expert in computer security with more than eighteen years experience in investigations, computer forensics, technical, and information security.


Customer Reviews

4.4 out of 5 stars
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
This is a great book which explains the tools and techniques digital forensics. It covers industry standard comercial and freeware solutions to a number of forensic challenges including recovery of files from hard disks and other media, live incident response, and intreperation of network traffic. The book clearly shows how these techniques can assist an investigation.
The topics are covered with reference to example data held on the DVD that accompanies this book. This gives the reader the oportunity to try out the skills and techniques outlined in the book. This is a hands on exercise in digital forensics with simulated real world data for you to get your teeth into and a great introductory text for anyone with an interest in this area.
Comment 11 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This was my first book on the subject and ok even though this review isn't the most positive
the book is well written and well laid out but i cant help feeling this is a beginners book.
Or i am being naive and think there more to it and there is not.

it has all the basics and is a good first step.
in my eyes the book is aimed at a strange level. its just above hobbyist and round about system admin.
but what it does have is the basics and after reading you will feel that's so obvious why didn't i think of that.
whats its not it a self study guide with challenges or tutorials.
And its not a university sort of theory heavy book.
Its almost a light coffee brake sort of book.
it tells you enough to get the job done in a sort of way. after reading this i would give a stab at it if i was the last resort but by no means promote myself saying i have read it.
its a bit like a whistle stop tour, shows you everything briefly, dosent show the steps in detail and dosent give you the mind set.
although there is a disk provided with software and mock data. but its pointless and there just because they can. also there is no explanation of the software and how to set it up to be used. i was lucky to get my hands on some software in university that is mentioned in the book. i decided to try something described in the book. but i couldn't reproduce the results they got.

but after all that its not a bad book just not what i think a lot of people would expect.
its more a my first guide to wet your appetite
Comment 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
If only all books are written like this. The purpose of this book is to introduce IT Staff or anyone interested in forensics. The authors have given open-source examples of application to use to extract data, create the image file, restore deleted files amongst other examples.

The book is written in stages so that it is easy to read and understand. The applications are covered in basic detail but have enough written to understand their limitations. An added bonus is that the book has a DVD with live data that you can look at.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
My first book on digital forensics.
The book is really well written and covers a broad aspect of different digital forensics incidents.
Also the included DVD, gives you access to the files discussed during the chapters for some hands-on experience with the tools mentioned.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Love this book. Although I'm only half way through it, it has taught me a lot about incident response and some of the best practices and techniques to safely extract data.

Negative part: After all my note taking and highlighting in the book some of the pages have come loose and tend to slip out.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse


Feedback