Cyber Crime Investigator's Field Guide / Edition 2

Cyber Crime Investigator's Field Guide / Edition 2

by Bruce Middleton, Richard B. Middleton
     
 

ISBN-10: 0849327687

ISBN-13: 9780849327681

Pub. Date: 01/25/2005

Publisher: Taylor & Francis

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer

…  See more details below

Overview

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.

This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.

Read More

Product Details

ISBN-13:
9780849327681
Publisher:
Taylor & Francis
Publication date:
01/25/2005
Edition description:
REV
Pages:
296
Product dimensions:
6.10(w) x 9.30(h) x 1.00(d)

Related Subjects

Table of Contents

1The Initial Contact1
2Client Site Arrival5
3Evidence Collection Procedures9
4Evidence Collection and Analysis Tools17
5Password Recovery77
6Questions and Answers by Subject Area81
7Recommended Reference Materials97
8Case Study103
App. A: Glossary133
App. BPort Numbers Used by Malicious Trojan Horse Programs137
App. CAttack Signatures141
App. DUNIX/Linux Commands143
App. ECisco PIX Firewall Commands159
App. FDiscovering Unauthorized Access to Your Computer165
App. GU.S. Department of Justice Search and Seizure Guidelines169
The Author335
Index337

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >