|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_ocn852469265 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130405s2013 nyu o 000 0 eng d |
040 |
|
|
|a S4S
|b eng
|e rda
|e pn
|c S4S
|d OCLCO
|d UMI
|d IDEBK
|d TEFOD
|d DEBSZ
|d COO
|d B24X7
|d YDXCP
|d TEFOD
|d OCLCF
|d OCLCQ
|d OCLCA
|d EBLCP
|d TOH
|d OCLCQ
|d N$T
|d D6H
|d LIV
|d CZL
|d DST
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 852680926
|a 867877930
|a 889240658
|a 1084387389
|a 1227045070
|a 1295604374
|a 1300469445
|a 1303317115
|
020 |
|
|
|a 9780071742467
|q (electronic bk.)
|
020 |
|
|
|a 0071742468
|q (electronic bk.)
|
020 |
|
|
|z 9780071742450
|
020 |
|
|
|z 007174245X
|
020 |
|
|
|z 0071742468
|
029 |
1 |
|
|a AU@
|b 000052007273
|
029 |
1 |
|
|a AU@
|b 000053295756
|
029 |
1 |
|
|a DEBBG
|b BV041430989
|
029 |
1 |
|
|a DEBSZ
|b 398268088
|
029 |
1 |
|
|a AU@
|b 000066230389
|
035 |
|
|
|a (OCoLC)852469265
|z (OCoLC)852680926
|z (OCoLC)867877930
|z (OCoLC)889240658
|z (OCoLC)1084387389
|z (OCoLC)1227045070
|z (OCoLC)1295604374
|z (OCoLC)1300469445
|z (OCoLC)1303317115
|
037 |
|
|
|a CL0500000222
|b Safari Books Online
|
037 |
|
|
|a D3A5F22C-C68B-44E5-A271-E8F198BF4310
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a HV8079.C65
|b C68 2013
|
072 |
|
7 |
|a COM
|2 ukslc
|
072 |
|
7 |
|a JKVF1
|2 bicssc
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UT
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
082 |
0 |
4 |
|a 363.25/968
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cowen, David.
|
245 |
1 |
0 |
|a Computer forensics :
|b infoSec Pro guide /
|c David Cowen.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill,
|c [2013]
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
0 |
|
|a InfoSec Pro guide
|
520 |
|
|
|a Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources,
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Cover -- About the Author -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- Who Should Read This Book -- What This Book Covers -- How to Use This Book -- How Is This Book Organized? -- About the Series -- Lingo -- IMHO -- Budget Note -- In Actual Practice -- Your Plan -- Into Action -- Part I: Getting Started -- Chapter 1: What Is Computer Forensics? -- What You Can Do with Computer Forensics -- How People Get Involved in Computer Forensics -- Law Enforcement -- Military -- University Programs -- IT or Computer Security Professionals -- Incident Response vs. Computer Forensics -- How Computer Forensic Tools Work -- Types of Computer Forensic Tools -- Professional Licensing Requirements -- Chapter 2: Learning Computer Forensics -- Where and How to Get Training -- Law Enforcement Training -- Corporate Training -- Where and How to Get Certified -- Vendor Certifications -- Vendor-Neutral Certifications -- Staying Current -- Conferences -- Blogs -- Forums -- Podcasts -- Associations -- Chapter 3: Creating a Lab -- Choosing Where to Put Your Lab -- Access Controls -- Electrical Power -- Air Conditioning -- Privacy -- Gathering the Tools of the Trade -- Write Blockers -- Drive Kits -- External Storage -- Screwdriver Kits -- Antistatic Bags -- Adaptors -- Forensic Workstation -- Choosing Forensic Software -- Open Source Software -- Commercial Software -- Storing Evidence -- Securing Your Evidence -- Organizing Your Evidence -- Disposing of Old Evidence -- Part II: Your First Investigation -- Chapter 4: How to Approach a Computer Forensics Investigation -- The Investigative Process -- What Are You Being Asked to Find Out? -- Where Would the Data Exist? -- What Applications Might Have Been Used in Creating the Data? -- Should You Request to Go Beyond the Scope of the Investigation?.
|
505 |
8 |
|
|a Testing Your Hypothesis -- Step 1. Define Your Hypothesis -- Step 2. Determine a Repeatable Test -- Step 3. Create Your Test Environment -- Step 4. Document Your Testing -- The Forensic Data Landscape -- Active Data -- Unallocated Space -- Slack Space -- Mobile Devices -- External Storage -- What Do You Have the Authority to Access -- Who Hosts the Data? -- Who Owns the Device? -- Expectation of Privacy -- Chapter 5: Choosing Your Procedures -- Forensic Imaging -- Determining Your Comfort Level -- Forensic Imaging Method Pros and Cons -- Creating Forms and Your Lab Manual -- Chain of Custody Forms -- Request Forms -- Report Forms -- Standard Operating Procedures Manual -- Chapter 6: Testing Your Tools -- When Do You Need to Test -- Collecting Data for Public Research or Presentations -- Testing a Forensic Method -- Testing a Tool -- Where to Get Test Evidence -- Raw Images -- Creating Your Own Test Images -- Forensic Challenges -- Learn Forensics with David Cowen on YouTube -- Honeynet Project -- DC3 Challenge -- DFRWS Challenge -- SANS Forensic Challenges -- High School Forensic Challenge -- Collections of Tool Testing Images -- Digital Forensic Tool Testing Images -- NIST Computer Forensics Reference Data Sets Images -- The Hacking Case -- NIST Computer Forensics Tool Testing -- Chapter 7: Live vs. Postmortem Forensics -- Live Forensics -- When Live Forensics Is the Best Option -- Tools for Live Forensics -- Postmortem Forensics -- Postmortem Memory Analysis -- Chapter 8: Capturing Evidence -- Creating Forensic Images of Internal Hard Drives -- FTK Imager with a Hardware Write Blocker -- FTK Imager with a Software Write Blocker -- Creating Forensic Images of External Drives -- FTK Imager with a USB Write Blocker -- FTK Imager with a Software Write Blocker -- Software Write Blocking on Linux Systems -- Creating Forensic Images of Network Shares.
|
505 |
8 |
|
|a Capturing a Network Share with FTK Imager -- Mobile Devices -- Servers -- Chapter 9: Nontraditional Digital Forensics -- Breaking the Rules: Nontraditional Digital Forensic Techniques -- Volatile Artifacts -- Malware -- Encrypted File Systems -- Challenges to Accessing Encrypted Data -- Mobile Devices: Smart Phones and Tablets -- Solid State Drives -- Virtual Machines -- Part III: Case Examples: How to Work a Case -- Chapter 10: Establishing the Investigation Type and Criteria -- Determining What Type of Investigation Is Required -- Human Resources Cases -- Administrator Abuse -- Stealing Information -- Internal Leaks -- Keyloggers and Malware -- What to Do When Criteria Causes an Overlap -- What to Do When No Criteria Matches -- Where Should the Evidence Be? -- Did This Occur over the Network? -- Nothing Working? Create a Super Timeline -- Chapter 11: Human Resources Cases -- Results of a Human Resource Case -- How to Work a Pornography Case -- Pornography Case Study -- How to Investigate a Pornography Case -- How to Work a Productivity Waste Case -- Chapter 12: Administrator Abuse -- The Abuse of Omniscience -- Scenario 1: Administrator Runs a Pornographic Site Using Company Resources -- Beginning an Investigation -- The Web Server's Role in the Network -- Directories -- Virtual Servers -- Virtual Directories -- Scenario 2: Exploiting Insider Knowledge Against an Ex-employer -- A Private Investigator Calls... -- As if They're Reading Our Minds... -- What a Network Vulnerability Assessment Can Reveal -- E-mail Data Review and Server Restoration -- Stepping Up Your Game: Knowledge Meets Creativity -- Chapter 13: Stealing Information -- What Are We Looking For? -- Determining Where the Data Went -- LNK Files -- Shellbags -- Scenario: Recovering Log Files to Catch a Thief -- Chapter 14: Internal Leaks -- Why Internal Leaks Happen.
|
505 |
8 |
|
|a Investigating Internal Leaks -- Reviewing the Registry Files -- Identifying LNK Files -- Wrapping Up the Investigation -- Using File System Meta-data to Track Leaked or Printed Materials -- Chapter 15: Keyloggers and Malware -- Defining Keyloggers and Malware -- How to Detect Keyloggers and Malware -- Registry Files -- Prefetch Files -- Keyword Searches -- Handling Suspicious Files -- Determining How an Infection Occurred -- What We Know About This Infection -- What We Know About the Keylogger -- Identifying What Data Was Captured -- Finding Information About the Attacker -- What We Know About the Attacker -- Where to Find More About the Attacker -- Part IV: Defending Your Work -- Chapter 16: Documenting Your Findings with Reports -- Documenting Your Findings -- Who Asked You to Undertake the Investigation -- What You Were Asked to Do -- What You Reviewed -- What You Found -- What Your Findings Mean -- Types of Reports -- Informal Report -- Incident Report -- Internal Report -- Declaration -- Affidavit -- Explaining Your Work -- Define Technical Terms -- Provide Examples in Layperson Terms -- Explain Artifacts -- Chapter 17: Litigation and Reports for Court and Exhibits -- Important Legal Terms -- What Type of Witness Are You? -- Fact Witness -- Expert Consultant -- Expert Witness -- Special Master -- Neutral -- Writing Reports for Court -- Declarations in Support of Motions -- Expert Reports -- Creating Exhibits -- Working with Forensic Artifacts -- InfoSec Pro Series: Glossary -- Index.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Forensic sciences.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Forensic Sciences
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Criminalistique.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a forensic science.
|2 aat
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Forensic sciences
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Cowen, David.
|t Computer forensics.
|d New York : McGraw-Hill, [2013]
|z 9780071742450
|w (DLC) 2013010672
|w (OCoLC)836748319
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071742450/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6256604
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4958695
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00056209
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26088603
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12087408
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2686615
|
994 |
|
|
|a 92
|b IZTAP
|