HOME > 상세정보

상세정보

Hacking exposed computer forensics 2nd ed

Hacking exposed computer forensics 2nd ed

자료유형
단행본
개인저자
Philipp, Aaron. Cowen, David. Davis, Chris (Christopher Michael)
서명 / 저자사항
Hacking exposed computer forensics / Aaron Philipp, David Cowen, Chris Davis.
판사항
2nd ed.
발행사항
New York :   McGraw-Hill/Osborne,   2010.  
형태사항
xxiv, 518 p. : ill. ; 24 cm.
ISBN
9780071626774
일반주기
Includes index.  
일반주제명
Computer crimes -- Investigation. Computer security.
000 00928camuu2200301 a 4500
001 000045660254
005 20110809113018
008 110808s2010 nyua 001 0 eng d
010 ▼a 2010481199
020 ▼a 9780071626774
035 ▼a (KERIS)REF000015919024
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a HV8079.C65 ▼b D35 2010
082 0 0 ▼a 005.8 ▼2 22
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b P551h2
100 1 ▼a Philipp, Aaron.
245 1 0 ▼a Hacking exposed computer forensics / ▼c Aaron Philipp, David Cowen, Chris Davis.
250 ▼a 2nd ed.
260 ▼a New York : ▼b McGraw-Hill/Osborne, ▼c 2010.
300 ▼a xxiv, 518 p. : ▼b ill. ; ▼c 24 cm.
500 ▼a Includes index.
650 0 ▼a Computer crimes ▼x Investigation.
650 0 ▼a Computer security.
700 1 ▼a Cowen, David.
700 1 ▼a Davis, Chris ▼q (Christopher Michael)
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 P551h2 등록번호 121212061 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

A completely updated bestseller with six brand-new chapters covering the latest computer forensics cases

In this new edition, the leading experts in computer forensics reveal the secrets and strategies for investigating computer crime in the internationally bestselling Hacking Exposed format. You will get detailed information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence.

Hacking Exposed Computer Forensics, Second Edition includes six brand-new chapters to cover IP theft, employee misconduct, securities fraud, embezzlement, organized crime and hacking, and foreign corrupt practices/money laundering. An entire new section dedicated to specific case types puts techniques into context and gives general frameworks for each scenario.


정보제공 : Aladin

목차

Part 1: Preparing for an Incident ; Ch. 1: The Forensics Process; Ch. 2: Computer Fundamentals; Ch. 3: Forensics Lab Environment Preparation; Part 2: Collecting the Evidence ; Ch. 4: Forensically Sound Evidence Collection; Ch. 5: Remote Investigations and Collections; Part 3: Forensic Investigation Techniques ; Ch. 6: Microsoft Windows Systems Analysis; Ch. 7: Linux Analysis; Ch. 8: Macintosh Analysis; Ch. 9: Defeating Anti-Forensic Techniques; Ch. 10: Enterprise Storage Analysis; Ch. 11: Email Analysis; Ch. 12: Tracking User Activity; Ch. 13: Forensic Analysis of Mobile Devices; Part 4: Presenting your Findings ;Ch. 14: Documenting the Investigation;Ch. 15: The Justice System; Part 5: Putting It All Together ; Ch. 16: IP Theft;Ch. 17: Employee Misconduct;Ch. 18: Employee Fraud;Ch. 19: Corporate Fraud;Ch. 20. Organized Cyber Crime;Ch. 21. Consumer Fraud;Appendix A. Searching Techniques;Index


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)