Terrorist attacks are no longer relegated to airports and federal buildings. Using personal computers as their weapons, hackers and cirminals (some only 11 years old) have attacked the internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book/cd package provides a complete overview of computer forensics from its definition to 'crime scene investigation,' seizure of data, determining the 'fingerprints' of the crime, and tracking down the criminal. The book focuses on 'solving the crime' rather than information security.Key featurescomprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attackscase studies and vignettes of actual computer crimesselected topics: computer forensics fundamentals; data recovery; evidence collection and data seizure; duplication and preservation of digital evidence; electronic evidence reconstructing past events' deterrence through attacker id; destruction of e-mail; is the u.S. Government prepared for information warfare; the dark world of the cyber underground; protection against random terrorist information warfare tactics; the cyber foot print and criminal tracking; the individual exposed; case studies and vignettescd includes tools, presentations, and demos of the latest computer forensics software, including partition images from the forensic challenge table of contents : contents:1. Computer forensics fundamentals; 2. Types of computer forensics technology; 3. Types of vendor and computer forensics services; 4. Computer forensics evidence and capture; 5. Data recovery; 6. Evidence collection and data seizure; 7. Duplication and preservation of digital evidence; 8. Computer image verification and aughentication; 9. Computer forensics analysis; 10. Discovery of electronic evidence; 11. The information warfare arsenal and tactics of the military; 12. The informat
"synopsis" may belong to another edition of this title.
The mightiest fortresses in the world can fail, and when that happens all you can do is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer Forensics: Computer Crime Scene Investigation explains how to gather evidence of computer crimes in such a way that it will be more likely to lead to a conviction in a criminal court. It's an interesting legal area--after all, it's almost always you, and not any law enforcement agency, doing the surveillance and evidence gathering on your computer systems--and John Vacca has done a fair bit of research. This book will probably expand your thinking on the subject of information security.
On the other hand, though Vacca gives good general advice (don't lose volatile information by shutting a compromised machine down mid-attack; do be prepared to translate memory dumps into jury-readable form), he sometimes meanders into generalisations and irrelevancies. It's certainly scary that terrorists distribute their plans via public Web sites, but that fact is hardly helpful to someone wanting to prosecute the guy who vandalised the corporate Web site. Similarly interesting, but practically irrelevant to most of us, are discussions of high-energy radio frequency (HERF) and electromagnetic pulse (EMP) weapons that can knock out information systems from a distance. More focus on evidence collection in organisational computing environments would make this book useful, rather than just generally informative. --David Wall (Amazon.com)
Topics covered: how to gather evidence of a hack attack after the fact, and a lot of general-interest information on the state of crime and law-enforcement in computer technology. Coverage is almost all general in nature, dealing with how to formulate a strategy and deal with events without getting into details of any operating system or computing environment.
John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computerrelated topics, including Electronic Commerce 4/E.
"About this title" may belong to another edition of this title.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 731. Seller Inventory # 11303288
Quantity: 4 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 731. Seller Inventory # 2614403239
Quantity: 4 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 731. Seller Inventory # 1814403245
Quantity: 4 available