New, ship fast, delivered in 5 days in UK. No PO Box.
"synopsis" may belong to another edition of this title.
The mightiest fortresses in the world can fail, and when that happens all you can do is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer Forensics: Computer Crime Scene Investigation explains how to gather evidence of computer crimes in such a way that it will be more likely to lead to a conviction in a criminal court. It's an interesting legal area--after all, it's almost always you, and not any law enforcement agency, doing the surveillance and evidence gathering on your computer systems--and John Vacca has done a fair bit of research. This book will probably expand your thinking on the subject of information security.
On the other hand, though Vacca gives good general advice (don't lose volatile information by shutting a compromised machine down mid-attack; do be prepared to translate memory dumps into jury-readable form), he sometimes meanders into generalisations and irrelevancies. It's certainly scary that terrorists distribute their plans via public Web sites, but that fact is hardly helpful to someone wanting to prosecute the guy who vandalised the corporate Web site. Similarly interesting, but practically irrelevant to most of us, are discussions of high-energy radio frequency (HERF) and electromagnetic pulse (EMP) weapons that can knock out information systems from a distance. More focus on evidence collection in organisational computing environments would make this book useful, rather than just generally informative. --David Wall (Amazon.com)
Topics covered: how to gather evidence of a hack attack after the fact, and a lot of general-interest information on the state of crime and law-enforcement in computer technology. Coverage is almost all general in nature, dealing with how to formulate a strategy and deal with events without getting into details of any operating system or computing environment.
No matter how secure computer users think their information is, chances are there are hackers who can access it. This comprehensive reference provides readers with all the information and software they need to track down these computer criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. The book contains a thorough overview of the subject from basic definitions to data recovery techniques to auditing methods to terrorist cyber-attacks. Numerous exercises, case studies, and vignettes of actual criminal methods enhance the topics under discussion, providing the reader with solutions to computer crime in the real world. Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Case Studies and Vignettes.
"About this title" may belong to another edition of this title.
£ 5.60 shipping from United Kingdom to U.S.A.
Destination, rates & speedsSeller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR014227671
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 2nd Edition. Used book that is in clean, average condition without any missing pages. Seller Inventory # 7741928-6
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 2nd Edition. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # GRP82142684
Quantity: 1 available
Seller: Better World Books Ltd, Dunfermline, United Kingdom
Condition: Good. 2nd Edition. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # GRP82142684
Quantity: 1 available
Seller: Better World Books Ltd, Dunfermline, United Kingdom
Condition: Very Good. 2nd Edition. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # GRP89827271
Quantity: 2 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_357158608
Quantity: 1 available
Seller: BOOKWEST, Phoenix, AZ, U.S.A.
Soft cover. Condition: New. 2nd Edition. US SELLER SHIPS FAST FROM USA. Seller Inventory # DOMONLY-143C2-1584503890-PB-3P2-lb-Wht
Quantity: 1 available
Seller: The Book Spot, Sioux Falls, MN, U.S.A.
Paperback. Condition: New. Seller Inventory # Abebooks378427
Quantity: 1 available
Seller: BennettBooksLtd, North Las Vegas, NV, U.S.A.
Paperback. Condition: New. In shrink wrap. Looks like an interesting title! Seller Inventory # Q-1584503890
Quantity: 1 available