Listing 1 - 1 of 1 |
Sort by
|
Choose an application
« The Definitive Guide to Computer Forensics: Theory and Hands-On Practice. Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject. Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever. The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins. » [Publisher]
Computer security. --- Data recovery (Computer science) --- 681.3*K65 --- Forensic sciences. --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer security --- Forensic sciences --- Systèmes informatiques --- Données --- Criminalistique --- Mesures de sûreté. --- Récupération (informatique) --- Systèmes informatiques --- Données --- Mesures de sûreté. --- Récupération (informatique)
Listing 1 - 1 of 1 |
Sort by
|