libcats.org
Главная

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

Обложка книги Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

,
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a comprehensive, highly usable, and clearly organized resource to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology.

Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. The field bible for infosecurity professionals, this book introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.

You will understand how to:
  • Identify inappropriate uses of corporate IT
  • Examine computing environments to identify and gather electronic evidence of wrongdoing
  • Secure corporate systems from further misuse
  • Identify individuals responsible for engaging in inappropriate acts taken with or without corporate computing systems
  • Protect and secure electronic evidence from intentional or accidental modification or destruction

    Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look under the hood and behind closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.
  • Популярные книги за неделю:

    Издание 'Сделай сам'. 1999 № 02 (DjVU)

    Автор:
    Размер книги: 3.94 Mb

    О физической природе шаровой молнии

    Автор:
    Категория: science, science, exact
    Размер книги: 5.03 Mb

    Ключ к сверхсознанию

    Автор:
    Категория: Путь к себе
    Размер книги: 309 Kb

    Технология солода и пива

    Автор:
    Категория: Tech
    Размер книги: 113.31 Mb

    Древо жизни

    Автор:
    Категория: Путь к себе
    Размер книги: 1.70 Mb

    Как обставить квартиру

    Автор:
    Категория: color, graph, house, home
    Размер книги: 4.92 Mb
    Только что пользователи скачали эти книги:

    Внетелесный опыт

    Автор: , Автор:
    Категория: Религия
    Размер книги: 70 Kb

    23rd Century Costs and Equipment

    Автор:
    Размер книги: 216 Kb

    Карен Робардс. Призраки озера

    Автор:
    Размер книги: 628 Kb

    The Presocratic Philosophers

    Автор:
    Размер книги: 4.04 Mb

    Due Jesuitenkirche in G.

    Автор:
    Размер книги: 68 Kb

    Dolly Dialogues

    Автор:
    Категория: fiction
    Размер книги: 159 Kb

    Sold

    Автор:
    Категория: fiction
    Размер книги: 779 Kb

    Dark Peril

    Автор:
    Категория: fiction
    Размер книги: 686 Kb