Muutke küpsiste eelistusi

E-raamat: Digital Archaeology: The Art and Science of Digital Forensics

  • Formaat: 608 pages
  • Ilmumisaeg: 16-Aug-2013
  • Kirjastus: Addison-Wesley Educational Publishers Inc
  • Keel: eng
  • ISBN-13: 9780132853798
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 40,94 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 608 pages
  • Ilmumisaeg: 16-Aug-2013
  • Kirjastus: Addison-Wesley Educational Publishers Inc
  • Keel: eng
  • ISBN-13: 9780132853798
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The Definitive, Up-to-Date Guide to Digital Forensics

The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. InDigital Archaeology, expert practitioner Michael Graves has written the most thorough, realistic, and up-to-date guide to the principles and techniques of modern digital forensics.

Graves begins by providing a solid understanding of the legal underpinnings of and critical laws affecting computer forensics, including key principles of evidence and case law. Next, he explains how to systematically and thoroughly investigate computer systems to unearth crimes or other misbehavior, and back it up with evidence that will stand up in court.

Drawing on the analogy of archaeological research, Graves explains each key tool and method investigators use to reliably uncover hidden information in digital systems. His detailed demonstrations often include the actual syntax of command-line utilities. Along the way, he presents exclusive coverage of facilities management, a full chapter on the crucial topic of first response to a digital crime scene, and up-to-the-minute coverage of investigating evidence in the cloud.

Graves concludes by presenting coverage of important professional and business issues associated with building a career in digital forensics, including current licensing and certification requirements.

Topics Covered Include

  • Acquiring and analyzing data in ways consistent with forensic procedure
  • Recovering and examining e-mail, Web, and networking activity
  • Investigating users’ behavior on mobile devices
  • Overcoming anti-forensics measures that seek to prevent data capture and analysis
  • Performing comprehensive electronic discovery in connection with lawsuits
  • Effectively managing cases and documenting the evidence you find
  • Planning and building your career in digital forensics

Digital Archaeology is a key resource for anyone preparing for a career as a professional investigator; for IT professionals who are sometimes called upon to assist in investigations; and for those seeking an explanation of the processes involved in preparing an effective defense, including how to avoid the legally indefensible destruction of digital evidence.

Arvustused

"For those looking for an introductory text on the topic of digital forensics, Digital Archaeology: The Art and Science of Digital Forensics is an excellent read. Its comprehensive overview of the entire topic, combined with the author's excellent writing skills and experience, make the book a worthwhile reference." -- Ben Rothke, CISSP - information security manager

Preface xiii
About the Author xxi
1 The Anatomy of a Digital Investigation 1(22)
A Basic Model for Investigators
2(6)
Understanding the Scope of the Investigation
8(4)
Identifying the Stakeholders
12(1)
The Art of Documentation
13(8)
Chapter Review
21(1)
Chapter Exercises
21(1)
References
22(1)
2 Laws Affecting Forensic Investigations 23(12)
Constitutional Implications of Forensic Investigation
24(5)
The Right to Privacy
29(2)
The Expert Witness
31(1)
Chapter Review
32(1)
Chapter Exercises
32(1)
References
33(2)
3 Search Warrants and Subpoenas 35(20)
Distinguishing between Warrants and Subpoenas
36(1)
What Is a Search and When Is It Legal?
37(3)
Basic Elements of Obtaining a Warrant
40(3)
The Plain View Doctrine
43(1)
The Warrantless Search
44(6)
Subpoenas
50(1)
Chapter Review
51(1)
Chapter Exercises
52(1)
References
52(3)
4 Legislated Privacy Concerns 55(16)
General Privacy
56(3)
Financial Legislation
59(3)
Privacy in Health Care and Education
62(2)
Privileged Information
64(3)
Chapter Review
67(1)
Chapter Exercises
68(1)
References
68(3)
5 The Admissibility of Evidence 71(20)
What Makes Evidence Admissible?
71(5)
Keeping Evidence Authentic
76(8)
Defining the Scope of the Search
84(1)
When the Constitution Doesn't Apply
84(5)
Chapter Review
89(1)
Chapter Exercises
89(1)
References
89(2)
6 First Response and the Digital Investigator 91(20)
Forensics and Computer Science
91(5)
Controlling the Scene of the Crime
96(4)
Handling Evidence
100(9)
Chapter Review
109(1)
Chapter Exercises
109(1)
References
110(1)
7 Data Acquisition 111(20)
Order of Volatility
112(1)
Memory and Running Processes
112(9)
Acquiring Media
121(7)
Chapter Review
128(1)
Chapter Exercises
128(1)
References
129(2)
8 Finding Lost Files 131(20)
File Recovery
131(10)
The Deleted File
141(4)
Data Carving
145(4)
Chapter Review
149(1)
Chapter Exercises
150(1)
References
150(1)
9 Document Analysis 151(34)
File Identification
151(6)
Understanding Metadata
157(15)
Mining the Temporary Files
172(4)
Identifying Alternate Hiding Places of Data
176(7)
Chapter Review
183(1)
Chapter Exercises
183(1)
References
183(2)
10 E-mail Forensics 185(28)
E-mail Technology
185(6)
Information Stores
191(5)
The Anatomy of an E-mail
196(7)
An Approach to E-mail Analysis
203(7)
Chapter Review
210(1)
Chapter Exercises
211(1)
References
211(2)
11 Web Forensics 213(34)
Internet Addresses
213(2)
Web Browsers
215(18)
Web Servers
233(5)
Proxy Servers
238(6)
Chapter Review
244(1)
Chapter Exercises
244(1)
References
245(2)
12 Searching the Network 247(30)
An Eagle's Eye View
247(1)
Initial Response
248(2)
Proactive Collection of Evidence
250(12)
Post-Incident Collection of Evidence
262(6)
Router and Switch Forensics
268(7)
Chapter Review
275(1)
Chapter Exercises
275(1)
References
276(1)
13 Excavating a Cloud 277(30)
What Is Cloud Computing?
277(2)
Shaping the Cloud
279(5)
The Implications of Cloud Forensics
284(7)
On Virtualization
291(9)
Constitutional Issues
300(3)
Chapter Review
303(1)
Chapter Exercises
304(1)
References
304(3)
14 Mobile Device Forensics 307(20)
Challenges of Mobile Device Forensics
307(1)
How Cell Phones Work
308(5)
Data Storage on Cell Phones
313(4)
Acquisition and Storage
317(5)
Legal Aspects of Mobile Device Forensics
322(2)
Chapter Review
324(1)
Chapter Exercises
325(1)
References
325(2)
15 Fighting Antiforensics 327(30)
Artifact Destruction
328(8)
Hiding Data on the System
336(11)
Covert Data
347(7)
Chapter Review
354(1)
Chapter Exercises
355(1)
References
355(2)
16 Litigation and Electronic Discovery 357(22)
What Is E-Discovery?
358(1)
A Roadmap of E-Discovery
358(19)
Conclusion
377(1)
Chapter Review
377(1)
Chapter Exercises
377(1)
References
378(1)
17 Case Management and Report Writing 379(16)
Managing a Case
379(10)
Writing Reports
389(4)
Chapter Review
393(1)
Chapter Exercises
394(1)
References
394(1)
18 Tools of the Digital Investigator 395(28)
Software Tools
395(15)
Working with "Court-Approved" Tools
410(3)
Hardware Tools
413(5)
Nontechnical Tools
418(3)
Chapter Review
421(1)
Chapter Exercises
422(1)
References
422(1)
19 Building a Forensic Workstation 423(18)
What Is a Forensic Workstation?
424(1)
Commercially Available Forensic Workstations
425(4)
Building a Forensic Workstation From Scratch
429(11)
Chapter Review
440(1)
Chapter Exercises
440(1)
References
440(1)
20 Licensing and Certification 441(16)
Digital Forensic Certification
441(1)
Vendor-Neutral Certification Programs
442(7)
Vendor-Specific Certification Programs
449(3)
Digital Forensic Licensing Requirements
452(2)
Chapter Review
454(1)
Chapter Exercises
454(1)
References
454(3)
21 The Business of Digital Forensics 457(28)
Starting a New Forensics Organization
458(8)
Maintaining the Organization
466(12)
Generating Revenue
478(3)
Organizational Certification
481(2)
Chapter Review
483(1)
Chapter Exercises
483(1)
References
483(2)
A
Chapter Review Answers
485(20)
B Sample Forms 505(6)
Glossary 511(10)
Index 521
Michael W. Graves has worked for more than fifteen years as a network specialist, security analyst, and forensic analyst. He worked as a contractor for the federal government on jobs involving digital investigations ranging from simple employee violations to potential national security threats, and participated in e-discovery for a major bank. Graves holds an M.S. in digital investigation from Champlain College, where he studied under pioneers Gary Kessler and Robert Simpson, among others. He also served several semesters as adjunct professor of computer science for the college.