Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
Printer
Bookmark
Hacking exposed computer forensics : secrets & solutions / Chris Davis, David Cowen, Aaron Phillip.
Author
Davis, Chris
[Browse]
Format
Book
Language
English
Published/Created
New York : McGraw-Hill/Osborne, c2005.
Description
xxx, 444 p. : ill. ; 24 cm.
Details
Subject(s)
Computer security
[Browse]
Forensic sciences
[Browse]
Related name
Philipp, Aaron
[Browse]
Cowen, David
[Browse]
Summary note
"Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here - from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies."--BOOK JACKET.
Notes
Includes index.
Action note
Committed to retain in perpetuity — ReCAP Shared Collection (HUL)
Contents
Preparing for an Incident
Case Study: Lab Preparations
Cashing Out
Preparing for a Forensics Operation
The Forensics Process
Types of Investigations
The Role of the Investigator
Elements of a Good Process
Cross-Validation
Proper Evidence Handling
Completeness of Investigation
Management of Archives
Technical Competency
Explicit Definition and Justification for the Process
Legal Compliance
Flexibility
Defining a Process
Assessment
Acquisition
Authentication
Analysis
Articulation
Archival
Computer Fundamentals
The Bottom-Up View of a Computer
It's All Just 1s and 0s
Learning from the Past: Giving Computers Memory
Basic Input and Output System (BIOS)
The Operating System
The Applications
Types of Media
Magnetic Media
Optical Media
Memory Technologies
Forensic Lab Environment Preparation
The Ultimate Computer Forensic Lab
What Is a Computer Forensic Laboratory?
Forensic Lab Security
Protecting the Forensic Lab
Forensic Computers
Components of a Forensic Host
Commercially Available Hardware Systems
Do-It-Yourself Hardware Systems
Data Storage
Forensic Hardware and Software Tools
Using Hardware Tools
Using Software Tools
Case Management
The Flyaway Kit
Bonus: Linux or Windows?
Collecting the Evidence
Case Study: The Collections Agency
Preparations
Revelations
Collecting Evidence
Forensically Sound Evidence Collection.
Show 53 more Contents items
Other title(s)
Computer forensics
ISBN
0072256753 (pbk.)
LCCN
^^2005297543
OCLC
57364550
RCP
H - S
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information
Other versions
Hacking exposed : computer forensics ; secrets and solutions / Chris Davis, David Cowen, Aaron Philipp.
id
9944876323506421