Корично изображение Електронна книга

Computer evidence : collection & preservation /

Основен автор: Brown, Christopher L. T.
Формат: Електронна книга
Език: English
Публикувано: Hingham, Mass. : Charles River Media, ℗♭2006.
Издание: 1st ed.
Предмети:
Онлайн достъп: http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=263327
Подобни документи: Print version:: Computer evidence.
Съдържание:
  • ""Contents""; ""Acknowledgments""; ""Introduction""; ""Part I: Computer Forensics and Evidence Dynamics""; ""Chapter 1 Computer Forensics Essentials""; ""What is Computer Forensics?""; ""Crime Scene Investigation""; ""Phases of Computer Forensics""; ""Formalized Computer Forensics from the Start""; ""Who Performs Computer Forensics?""; ""Seizing Computer Evidence""; ""Challenges to Computer Evidence""; ""Summary""; ""References""; ""Resources""; ""Chapter 2 Rules of Evidence, Case Law, and Regulation""; ""Understanding Rules of Evidence""; ""Expert Witness (Scientific) Acceptance""
  • ""Testifying Tipsâ€?You Are the Expert""""Computer-Related Case Law""; ""Regulation""; ""Summary""; ""References""; ""Resources""; ""Chapter 3 Evidence Dynamics""; ""Forces of Evidence Dynamics""; ""Human Forces""; ""Natural Forces""; ""Equipment Forces""; ""Proper Tools and Procedures""; ""Summary""; ""References""; ""Resources""; ""Part II: Information Systems""; ""Chapter 4 Interview, Policy, and Audit""; ""Supporting and Corroboratng Evidence""; ""Subject Interviews""; ""Policy Review""; ""Audit""; ""Executive Summary""; ""Recommendations""; ""Scope""; ""Host-Specific Findings""
  • ""War Dialing Results""""Conclusion""; ""Summary""; ""References""; ""Resources""; ""Chapter 5 Network Topology and Architecture""; ""Networking Concepts""; ""Types of Networks""; ""Physical Network Topology""; ""Network Cabling""; ""Wireless Networks""; ""Open Systems Interconnect (OSI) Model""; ""TCP/IP Addressing""; ""Diagramming Networks""; ""Summary""; ""References""; ""Resources""; ""Chapter 6 Volatile Data""; ""Types and Nature of Volatile Data""; ""Operating Systems""; ""Volatile Data in Routers and Appliances""; ""Volatile Data in Personal Devices""
  • ""Traditional Incident Response of Live Systems""""Understanding Windows Rootkits in Memory""; ""Accessing Volatile Data""; ""Summary""; ""References""; ""Part III: Data Storage Systems and Media""; ""Chapter 7 Physical Disk Technologies""; ""Physical Disk Characteristics""; ""Physical Disk Interfaces and Access Methods""; ""Logical Disk Addressing and Access""; ""Disk Features""; ""Summary""; ""References""; ""Resources""; ""Chapter 8 SAN, NAS, and RAID""; ""Disk Storage Expanded""; ""Redundant Array of Inexpensive Devices""; ""Storage Area Networks""; ""Network Attached Storage""
  • ""Storage Service Providers""""Summary""; ""References""; ""Chapter 9 Removable Media""; ""Removable, Portable Storage Devices""; ""Tape Systems""; ""Optical Discs""; ""Removable Disksâ€?Floppy and Ridged""; ""Flash Media""; ""Summary""; ""References""; ""Resources""; ""Part IV: Artifact Collection""; ""Chapter 10 Tools, Preparation, and Documentation""; ""Planning""; ""Boilerplates""; ""Hardware and Software Tools""; ""Tool Testing""; ""Documentation""; ""Summary""; ""References""; ""Resources""; ""Chapter 11 Collecting Volatile Data""; ""Benefits of Volatile-Data Collection""