Real Digital Forensics: Computer Security and Incident Response Paperback – 23 Sep 2005
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Frequently Bought Together
Customers Who Bought This Item Also Bought
Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Back Cover
You can't succeed in the field of computer forensics without hands-on practice―and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice.
From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.
You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.
Inside, you will find in-depth information on the following areas:
Responding to live incidents in both Windows and Unix environments
Determining whether an attack has actually occurred
Assembling a toolkit you can take to the scene of a computer-related crime
Analyzing volatile data, nonvolatile data, and files of unknown origin
Safely performing and documenting forensic duplications
Collecting and analyzing network-based evidence in Windows and Unix environments
Reconstructing Web browsing, e-mail activity, and Windows Registry changes
Tracing domain name ownership and the source of e-mails
Duplicating and analyzing the contents of PDAs and flash memory devices
The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.
© Copyright Pearson Education. All rights reserved.
About the Author
Keith Jones (Alexandria, VA) heads the forensics practice at Red Cliff Consulting. Former military intelligence officer Richard Bejtlich (Manassas Park, VA) is a security engineer at ManTech International Corporation's Computer Forensics and Intrusion Analysis division. A recognized authority on computer security, he has extensive experience with network security monitoring, incident response, and forensics. Curtis Rose (Alexandria, VA) is vice president of Red Cliff and an industry-recognized expert in computer security with more than eighteen years experience in investigations, computer forensics, technical, and information security.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
The topics are covered with reference to example data held on the DVD that accompanies this book. This gives the reader the oportunity to try out the skills and techniques outlined in the book. This is a hands on exercise in digital forensics with simulated real world data for you to get your teeth into and a great introductory text for anyone with an interest in this area.
the book is well written and well laid out but i cant help feeling this is a beginners book.
Or i am being naive and think there more to it and there is not.
it has all the basics and is a good first step.
in my eyes the book is aimed at a strange level. its just above hobbyist and round about system admin.
but what it does have is the basics and after reading you will feel that's so obvious why didn't i think of that.
whats its not it a self study guide with challenges or tutorials.
And its not a university sort of theory heavy book.
Its almost a light coffee brake sort of book.
it tells you enough to get the job done in a sort of way. after reading this i would give a stab at it if i was the last resort but by no means promote myself saying i have read it.
its a bit like a whistle stop tour, shows you everything briefly, dosent show the steps in detail and dosent give you the mind set.
although there is a disk provided with software and mock data. but its pointless and there just because they can. also there is no explanation of the software and how to set it up to be used. i was lucky to get my hands on some software in university that is mentioned in the book. i decided to try something described in the book. but i couldn't reproduce the results they got.
but after all that its not a bad book just not what i think a lot of people would expect.
its more a my first guide to wet your appetite
The book is written in stages so that it is easy to read and understand. The applications are covered in basic detail but have enough written to understand their limitations. An added bonus is that the book has a DVD with live data that you can look at.
The book is really well written and covers a broad aspect of different digital forensics incidents.
Also the included DVD, gives you access to the files discussed during the chapters for some hands-on experience with the tools mentioned.
Negative part: After all my note taking and highlighting in the book some of the pages have come loose and tend to slip out.
Most Recent Customer Reviews
This is college text for son and he reports satisfaction so who am I to disagree?Published 20 months ago by Mme Sosostris
A really good book. It helped me in my studies. It is accompanied by a CD which could include more . Good overall.Published on 9 Jun. 2014 by Vassilios Manoussos
Look for similar items by category
- Books > Business, Finance & Law > E-Commerce
- Books > Business, Finance & Law > Personal Finance > Online Trading & Investing
- Books > Computing & Internet > Digital Lifestyle > Online Shopping > Amazon
- Books > Computing & Internet > Networking & Security > Security
- Books > Computing & Internet > Web Development