|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn317877890 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090406s2009 njua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d DEBSZ
|d C6I
|d OCLCO
|d OCLCF
|d OCLCQ
|d IDEBK
|d OCLCQ
|d OCLCO
|d AU@
|d WYU
|d VT2
|d CZL
|d OCLCQ
|d Q2U
|d INARC
|
015 |
|
|
|a GBA8B8512
|2 bnb
|
016 |
7 |
|
|a 014777096
|2 Uk
|
019 |
|
|
|a 428740739
|a 1044240934
|a 1056351887
|a 1058974457
|a 1060870774
|a 1063814891
|a 1097166973
|a 1103281148
|a 1129337719
|a 1152995057
|a 1316267259
|a 1328432443
|
020 |
|
|
|a 9780321533203
|
020 |
|
|
|a 0321533208
|
020 |
|
|
|z 9780321544360
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|z 0321544366
|q (pbk. ;
|q alk. paper)
|
029 |
1 |
|
|a CHBIS
|b 006148948
|
029 |
1 |
|
|a CHVBK
|b 171190122
|
029 |
1 |
|
|a DEBSZ
|b 355405008
|
029 |
1 |
|
|a HEBIS
|b 291477763
|
035 |
|
|
|a (OCoLC)317877890
|z (OCoLC)428740739
|z (OCoLC)1044240934
|z (OCoLC)1056351887
|z (OCoLC)1058974457
|z (OCoLC)1060870774
|z (OCoLC)1063814891
|z (OCoLC)1097166973
|z (OCoLC)1103281148
|z (OCoLC)1129337719
|z (OCoLC)1152995057
|z (OCoLC)1316267259
|z (OCoLC)1328432443
|
037 |
|
|
|a CL0500000037
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.C55
|b F68 2009
|
082 |
0 |
4 |
|a 364.16/8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Fowler, Kevvie.
|
245 |
1 |
0 |
|a SQL server forensic analysis /
|c Kevvie Fowler.
|
260 |
|
|
|a Upper Saddle River, NJ :
|b Addison-Wesley,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xix, 482 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a "What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic methods and techniques, exposing readers to an entirely new area of forensics along the way. This fantastic book is a much needed and incredible contribution to the incident response and forensic communities."--Curtis W. Rose, founder of Curtis W. Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly-a disclosure that is painful for companies and customers alike. There is only one way to avoid this problem: Master the specific skills needed to fully investigate SQL Server intrusions. In SQL Server Forensic Analysis, author Kevvie Fowler shows how to collect and preserve database artifacts safely and non-disruptively; analyze them to confirm or rule out database intrusions; and retrace the actions of an intruder within a database server. A chapter-length case study reinforces Fowler's techniques as he guides you through a real-world investigation from start to finish. The techniques described in SQL Server Forensic Analysis can be used both to identify unauthorized data access and modifications and to gather the information needed to recover from an intrusion by restoring the pre-incident database state. Coverage includes Determining whether data was actually compromised during a database intrusion and, if so, which data Real-world forensic techniques that can be applied on all SQL Server instances, including those with default logging Identifying, extracting, and analyzing database evidence from both published and unpublished areas of SQL Server Building a complete SQL Server incident response toolkit Detecting and circumventing SQL Server rootkits Identifying and recovering previously deleted database data using native SQL Server commands SQL Server Forensic Analysis is the first book of its kind to focus on the unique area of SQL Server incident response and forensics. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, auditor, or database professional, you'll find this book an indispensable resource
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a SQL server.
|
630 |
0 |
7 |
|a SQL server.
|2 blmlsh
|
630 |
0 |
7 |
|a SQL server.
|2 fast
|0 (OCoLC)fst01376937
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a Computer crimes
|x Investigation.
|2 blmlsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation.
|2 fast
|0 (OCoLC)fst00872065
|
776 |
1 |
|
|z 0321544366
|z 9780321544360
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780321533203/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis23920087
|
938 |
|
|
|a Internet Archive
|b INAR
|n sqlserverforensi0000fowl
|
994 |
|
|
|a 92
|b IZTAP
|