Research Catalog

Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.

Title
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Author
Kruse, Warren G.
Publication
Boston, Mass. : Addison-Wesley : Lucent Technologies, c2002.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextRequest in advance QA76.9.A25 K78 2002Off-site

Holdings

Details

Additional Authors
Heiser, Jay G.
Description
xiii, 392 p. : ill.; 24 cm.
Summary
"Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--BOOK JACKET.
Subject
  • Computer security
  • Computer networks > Security measures
  • Forensic sciences
  • Computerkriminalität
  • Computersicherheit
  • Rechnernetz
  • Computer Security
  • Forensic Sciences
Bibliography (note)
  • Includes bibliographical references (p. 381-384) and index.
Processing Action (note)
  • committed to retain
Contents
Ch. 1. Introduction to Computer Forensics -- Ch. 2. Tracking an Offender -- Ch. 3. The Basics of Hard Drives and Storage Media -- Ch. 4. Encryption and Forensics -- Ch. 5. Data Hiding -- Ch. 6. Hostile Code -- Ch. 7. Your Electronic Toolkit -- Ch. 8. Investigating Windows Computers -- Ch. 9. Introduction to Unix for Forensic Examiners -- Ch. 10. Compromising a Unix Host -- Ch. 11. Investigating a Unix Host -- Ch. 12. Introduction to the Criminal Justice System -- Ch. 13. Conclusion -- App. A. Internet Data Center Response Plan -- App. B. Incident Response Triage Questionnaire -- App. C. How to Become a Unix Guru -- App. D. Exporting a Windows 2000 Personal Certificate -- App. E. How to Crowbar Unix Hosts -- App. F. Creating a Linux Boot CD -- App. G. Contents of a Forensic CD.
ISBN
  • 0201707195 (pbk.)
  • 9780201707199 (pbk.)
LCCN
^^^00103410^
OCLC
52815421
Owning Institutions
Harvard Library