TY - BOOK ID - 29377150 TI - Forensic discovery AU - Farmer, Dan AU - Venema, Wietse PY - 2005 SN - 020163497X PB - Upper Saddle River, NJ : Addison-Wesley, DB - UniCat KW - Computer security. KW - Data recovery (Computer science) KW - 681.3*K65 KW - Forensic sciences. KW - Criminalistics KW - Forensic science KW - Science KW - Criminal investigation KW - Data reconstruction (Computer science) KW - Reconstruction, Data (Computer science) KW - Recovery, Data (Computer science) KW - Electronic data processing KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Electronic digital computers KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) KW - Security measures KW - Cyber security KW - Cybersecurity KW - Protection of computer systems KW - Protection KW - Computer security KW - Forensic sciences KW - Systèmes informatiques KW - Données KW - Criminalistique KW - Mesures de sûreté. KW - Récupération (informatique) KW - Systèmes informatiques KW - Données KW - Mesures de sûreté. KW - Récupération (informatique) UR - https://www.unicat.be/uniCat?func=search&query=sysid:29377150 AB - « The Definitive Guide to Computer Forensics: Theory and Hands-On Practice. Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject. Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever. The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins. » [Publisher] ER -