free hit counter code Real Digital Forensics: Computer Security and Incident Response - GoBooks - Download Free Book
Ads Banner
Hot Best Seller

Real Digital Forensics: Computer Security and Incident Response

Availability: Ready to download

You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to le


Compare
Ads Banner

You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to le

30 review for Real Digital Forensics: Computer Security and Incident Response

  1. 5 out of 5

    Takedown

    I love how old this book is and yet how relevant those topics are today. Incident Response is way more important today than back then, but it blows my mind that some people started doing it way back before it became mainstream. Truly pioneers of the field. It is a practical, hands-on DFIR book, however most of the tools is outdated. This is expected for any technical books, that focus on tools. It is still useful and relevant today since methods largely the same, so worth a read anyway. You just h I love how old this book is and yet how relevant those topics are today. Incident Response is way more important today than back then, but it blows my mind that some people started doing it way back before it became mainstream. Truly pioneers of the field. It is a practical, hands-on DFIR book, however most of the tools is outdated. This is expected for any technical books, that focus on tools. It is still useful and relevant today since methods largely the same, so worth a read anyway. You just have to find a tools yourself.

  2. 4 out of 5

    Trevlix

    If you want a book which will SHOW, and not just tell you, how to do forensics on Windows and Linux as well as network forensics and malware analysis, this is the book for you. Written by definite experts in the industry. I would normally give this a 5, but there are a few minor typos which spoiled it for me. They also left out a few explanations which I thought should be in there. Still worth having on your bookshelf.

  3. 5 out of 5

    Justine

    Good practical tools - fairly easy to read and understand - not a whole lot of concepts; this was mainly a "how-to" guide on a lot of related, but independent tools & processes. Good practical tools - fairly easy to read and understand - not a whole lot of concepts; this was mainly a "how-to" guide on a lot of related, but independent tools & processes.

  4. 5 out of 5

    Thad Butterworth

    Dry, but full of good information.

  5. 5 out of 5

    Paul Jaramillo

  6. 5 out of 5

    Chris

  7. 5 out of 5

    Epicurean

  8. 4 out of 5

    Timo

  9. 4 out of 5

    Paul Watson

  10. 4 out of 5

    Harry Rose

  11. 5 out of 5

    Xavier

  12. 5 out of 5

    Richard Bejtlich

  13. 5 out of 5

    VintiqueBooks

  14. 4 out of 5

    Dustin Lenz

  15. 5 out of 5

    Chris Reesman

  16. 5 out of 5

    William

  17. 4 out of 5

    Mr Jon Klein

  18. 5 out of 5

    Joseph

  19. 5 out of 5

    Dwayne

  20. 5 out of 5

    Rumell Khan

  21. 5 out of 5

    Erik Moore

  22. 5 out of 5

    Dean

  23. 5 out of 5

    Cassinator

  24. 5 out of 5

    Anton

  25. 4 out of 5

    Alicia Deavens

  26. 4 out of 5

    Adrian

  27. 5 out of 5

    Stephen

  28. 4 out of 5

    Leland

  29. 5 out of 5

    Andrew Douma

  30. 4 out of 5

    Jini Km

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.