skip to content
Real digital forensics : computer security and incident response Preview this item
ClosePreview this item
Checking...

Real digital forensics : computer security and incident response

Author: Keith J Jones; Richard Bejtlich; Curtis W Rose
Publisher: Upper Saddle River, NJ : Addison-Wesley, ©2006.
Edition/Format:   Print book : CD for computer   Computer File : EnglishView all editions and formats
Database:WorldCat
Summary:
DVD contains: Several gigabytes of data mirroring what analysts might find in real investigations.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book, Computer File
All Authors / Contributors: Keith J Jones; Richard Bejtlich; Curtis W Rose
ISBN: 0321240693 9780321240699
OCLC Number: 62732700
Notes: "First printing, September 2005"--Title page verso.
Accompanying DVD-ROM contains "several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realistic setting"--Page 4 of cover.
Includes index.
Description: xxx, 650 pages : illustrations ; 24 cm + 1 DVD-ROM (4 3/4 in.)
Details: System requirements for accompanying DVD-ROM: Microsoft Windows 2000/XP and an open source version of Unix, such as FreeBSD, OpenBSD, NetBSD, or Linux; DVD-ROM drive.
Contents: Preface. Acknowledgments. About the Authors. Case Studies. I. LIVE INCIDENT RESPONSE. 1. Windows Live Response. 2. Unix Live Response. II. NETWORK-BASED FORENSICS. 3. Collecting Network-Based Evidence. 4. Analyzing Network-Based Evidence for a Windows Intrusion. 5. Analyzing Network-Based Evidence for a Unix Intrusion. III. ACQUIRING A FORENSIC DUPLICATION. 6. Before You Jump Right In... 7. Commercial-Based Forensic Duplications. 8. Noncommercial-Based Forensic Duplications. IV. FORENSIC ANALYSIS TECHNIQUES. 9. Common Forensic Analysis Techniques. 10. Web Browsing Activity Reconstruction. 11. E-Mail Activity Reconstruction. 12. Microsoft Windows Registry Reconstruction. 13. Forensic Tool Analysis: An Introduction to Using Linux for Analyzing Files of Unknown Origin. 14. Forensic Tool Analysis: A Hands-On Analysis of the Linux File aio. 15. Forensic Tool Analysis: Analyzing Files of Unknown Origin (Windows). V. CREATING A COMPLETE FORENSIC TOOL KIT. 16. Building the Ultimate Response CD. 17. Making Your CD-ROM a Bootable Environment. VI. MOBILEDEVICE FORENSICS. 18. Forensic Duplication and Analysis of Personal Digital Assistants. 19. Forensic Duplication of USB and Compact Flash Memory Devices. 20. Forensic Analysis of USB and Compact Flash Memory Devices. VII. ONELINE-BASED FORENSCIS. 21. Tracing E-Mail. 22. Domain Name Ownership. Appendix: An Introduction to Perl. Index.
Responsibility: Keith J. Jones, Richard Bejtlich, Curtis W. Rose.

Abstract:

Written by a team of computer forensics experts, this book presents six realistic investigations and provides a DVD with the data required to follow along and practice. It allows readers to  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(6)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/62732700> # Real digital forensics : computer security and incident response
    a schema:CreativeWork, bgn:CD, schema:Book ;
    library:oclcnum "62732700" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/890548264#Place/upper_saddle_river_nj> ; # Upper Saddle River, NJ
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/890548264#Topic/computercriminaliteit> ; # Computercriminaliteit
    schema:about <http://id.loc.gov/authorities/subjects/sh85029493> ; # Computer crimes--Investigation
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/890548264#Topic/herstel> ; # Herstel
    schema:about <http://experiment.worldcat.org/entity/work/data/890548264#Topic/onderzoek> ; # Onderzoek
    schema:about <http://dewey.info/class/005.8/> ;
    schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/890548264#Topic/computerbeveiliging> ; # Computerbeveiliging
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/163880229> ; # Richard Bejtlich
    schema:contributor <http://viaf.org/viaf/163293676> ; # Curtis W. Rose
    schema:copyrightYear "2006" ;
    schema:creator <http://viaf.org/viaf/37845954> ; # Keith John Jones
    schema:datePublished "2006" ;
    schema:description "DVD contains: Several gigabytes of data mirroring what analysts might find in real investigations."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/890548264> ;
    schema:inLanguage "en" ;
    schema:name "Real digital forensics : computer security and incident response"@en ;
    schema:productID "62732700" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/62732700#PublicationEvent/upper_saddle_river_nj_addison_wesley_2006> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/890548264#Agent/addison_wesley> ; # Addison-Wesley
    schema:workExample <http://worldcat.org/isbn/9780321240699> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA562574> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/62732700> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/890548264#Agent/addison_wesley> # Addison-Wesley
    a bgn:Agent ;
    schema:name "Addison-Wesley" ;
    .

<http://experiment.worldcat.org/entity/work/data/890548264#Place/upper_saddle_river_nj> # Upper Saddle River, NJ
    a schema:Place ;
    schema:name "Upper Saddle River, NJ" ;
    .

<http://experiment.worldcat.org/entity/work/data/890548264#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
    schema:name "Computerbeveiliging"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/890548264#Topic/computercriminaliteit> # Computercriminaliteit
    a schema:Intangible ;
    schema:name "Computercriminaliteit"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029493> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/163293676> # Curtis W. Rose
    a schema:Person ;
    schema:familyName "Rose" ;
    schema:givenName "Curtis W." ;
    schema:name "Curtis W. Rose" ;
    .

<http://viaf.org/viaf/163880229> # Richard Bejtlich
    a schema:Person ;
    schema:familyName "Bejtlich" ;
    schema:givenName "Richard" ;
    schema:name "Richard Bejtlich" ;
    .

<http://viaf.org/viaf/37845954> # Keith John Jones
    a schema:Person ;
    schema:familyName "Jones" ;
    schema:givenName "Keith John" ;
    schema:givenName "Keith J." ;
    schema:name "Keith John Jones" ;
    .

<http://worldcat.org/isbn/9780321240699>
    a schema:ProductModel ;
    schema:isbn "0321240693" ;
    schema:isbn "9780321240699" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.