Flylib.com
Computer Forensics JumpStart
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
Michael G. Solomon
,
K Rudolph
,
Ed Tittel
,
Neil Broom
,
Diane Barrett
BUY ON AMAZON
Table of Contents
BackCover
Computer Forensics JumpStart
Introduction
Who Should Read This Book
What This Book Covers
Making the Most of This Book
Chapter 1: The Need forComputer Forensics
Defining Computer Forensics
Real-Life Examples of Computer Crime
Corporate versus Law Enforcement Concerns
Training
What Are Your Organization s Needs?
Terms to Know
Review Questions
Chapter 2: Preparation-What toDo Before You Start
Know Your Hardware
Know Your Operating System
Know Your Limits
Develop Your Incident Response Team
Terms to Know
Review Questions
Chapter 3: ComputerEvidence
What Is Computer Evidence?
Search and Seizure
Chain of Custody
Evidence Admissibility in a Court of Law
Leave No Trace
Terms to Know
Review Questions
Chapter 4: CommonTasks
Evidence Identification
Evidence Preservation
Evidence Analysis
Evidence Presentation
Terms to Know
Review Questions
Chapter 5: Capturingthe Data Image
Full Volume Images
Partial Volume Image
ImagingCapture Tools
Terms to Know
Review Questions
Chapter 6: Extracting Information from Data
What Are You Looking For?
How People Think
Picking the Low-Hanging Fruit
Hidden Evidence
Trace Evidence
Terms to Know
Review Questions
Chapter 7: Passwords andEncryption
Passwords
Encryption Basics
Common Encryption Practices
Strengths and Weaknesses of Encryption
Handling Encrypted Data
Terms to Know
Review Questions
Chapter 8: Common ForensicsTools
Disk Imaging and Validation Tools
Forensics Tools
Your Forensics Toolkit
Terms to Know
Review Questions
Chapter 9: Pulling It AllTogether
Begin with a Concise Summary
Document Everything, Assume Nothing
Formulating the Report
Sample Analysis Reports
Using Software to Generate Reports
Terms to Know
Review Questions
Chapter 10: How to Testify inCourt
Preparation Is Everything
Appearance Matters
What Matters Is What They Hear
Know Your Forensics Process and Tools
Say Only What Is Necessary
Keep It Simple
Be Ready to Justify Every Step
Summary
Terms to Know
Review Questions
Appendix A: Answers to Review Questions
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Appendix B: ForensicsResources
Organizations
Publications
Services
Software
Training
Appendix C: ForensicsCertifications
Advanced Information Security (AIS)
Certified Computer Examiner (CCE)
Certified Cyber-Crime Expert(C3E)
Certified Information Forensics Investigator (CIFI)
Certified Computer Crime Investigator (CCCI)
Certified Computer Forensic Technician (CCFT)
Certified Forensic Computer Examiner (CFCE)
Certified Information Systems Auditor (CISA)
EnCase Certified Examiner Program
GIAC Certified Forensic Analyst (GCFA)
Professional Certified Investigator (PCI)
Appendix D: ForensicsTools
Password-Cracking Utilities
CD Analysis Utilities
Metadata Viewer Utility
Graphic Viewing Utility
Forensics Hardware Devices
Computer Forensics Training
Glossary
D-E
F-I
J-P
R-S
T-Z
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Sidebars
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
Michael G. Solomon
,
K Rudolph
,
Ed Tittel
,
Neil Broom
,
Diane Barrett
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.6 How to use PuTTY Passphrase Agents
Appendix - Sample sshd_config File
Oracle Developer Forms Techniques
Standard Toolbar Implementation
Summary
When to Use the Same Trigger and How to Make It Fire at Multiple Levels
A Block Level Commit
Techniques for Querying and Updating New Data Sources in Forms Based on Objects
Introduction to 80x86 Assembly Language and Computer Architecture
Parts of a Computer System
Elements of Assembly Language
Basic Instructions
The Assembly Process
Appendix D 80x86 Instructions (by Mnemonic)
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Cisco Secure IDS
Data Correlation
Policy and Procedures
Security Business Issues
The Future of Intrusion Detection and Prevention
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Culture and Climate
Cross-Century Worldviews
The China Phenomenon
Appendix B Leadership Test
Java All-In-One Desk Reference For Dummies
Using Eclipse
Packaging and Documenting Your Classes
Book IV - Strings, Arrays, and Collections
Using the LinkedList Class
Getting Input from the User
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies