| 000 | 00928camuu2200301 a 4500 | |
| 001 | 000045660254 | |
| 005 | 20110809113018 | |
| 008 | 110808s2010 nyua 001 0 eng d | |
| 010 | ▼a 2010481199 | |
| 020 | ▼a 9780071626774 | |
| 035 | ▼a (KERIS)REF000015919024 | |
| 040 | ▼a DLC ▼c DLC ▼d DLC ▼d 211009 | |
| 050 | 0 0 | ▼a HV8079.C65 ▼b D35 2010 |
| 082 | 0 0 | ▼a 005.8 ▼2 22 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b P551h2 | |
| 100 | 1 | ▼a Philipp, Aaron. |
| 245 | 1 0 | ▼a Hacking exposed computer forensics / ▼c Aaron Philipp, David Cowen, Chris Davis. |
| 250 | ▼a 2nd ed. | |
| 260 | ▼a New York : ▼b McGraw-Hill/Osborne, ▼c 2010. | |
| 300 | ▼a xxiv, 518 p. : ▼b ill. ; ▼c 24 cm. | |
| 500 | ▼a Includes index. | |
| 650 | 0 | ▼a Computer crimes ▼x Investigation. |
| 650 | 0 | ▼a Computer security. |
| 700 | 1 | ▼a Cowen, David. |
| 700 | 1 | ▼a Davis, Chris ▼q (Christopher Michael) |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 P551h2 | 등록번호 121212061 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
A completely updated bestseller with six brand-new chapters covering the latest computer forensics cases
In this new edition, the leading experts in computer forensics reveal the secrets and strategies for investigating computer crime in the internationally bestselling Hacking Exposed format. You will get detailed information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence.
Hacking Exposed Computer Forensics, Second Edition includes six brand-new chapters to cover IP theft, employee misconduct, securities fraud, embezzlement, organized crime and hacking, and foreign corrupt practices/money laundering. An entire new section dedicated to specific case types puts techniques into context and gives general frameworks for each scenario.
정보제공 :
목차
Part 1: Preparing for an Incident ; Ch. 1: The Forensics Process; Ch. 2: Computer Fundamentals; Ch. 3: Forensics Lab Environment Preparation; Part 2: Collecting the Evidence ; Ch. 4: Forensically Sound Evidence Collection; Ch. 5: Remote Investigations and Collections; Part 3: Forensic Investigation Techniques ; Ch. 6: Microsoft Windows Systems Analysis; Ch. 7: Linux Analysis; Ch. 8: Macintosh Analysis; Ch. 9: Defeating Anti-Forensic Techniques; Ch. 10: Enterprise Storage Analysis; Ch. 11: Email Analysis; Ch. 12: Tracking User Activity; Ch. 13: Forensic Analysis of Mobile Devices; Part 4: Presenting your Findings ;Ch. 14: Documenting the Investigation;Ch. 15: The Justice System; Part 5: Putting It All Together ; Ch. 16: IP Theft;Ch. 17: Employee Misconduct;Ch. 18: Employee Fraud;Ch. 19: Corporate Fraud;Ch. 20. Organized Cyber Crime;Ch. 21. Consumer Fraud;Appendix A. Searching Techniques;Index
정보제공 :
