楼主: nelsoncwlee
1320 0

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Eviden [推广有奖]

  • 5关注
  • 82粉丝

已卖:31033份资源

学科带头人

62%

还不是VIP/贵宾

-

TA的文库  其他...

Financial Engineering

威望
1
论坛币
306386 个
通用积分
174.0716
学术水平
240 点
热心指数
288 点
信用等级
148 点
经验
241084 点
帖子
499
精华
0
在线时间
2716 小时
注册时间
2015-6-13
最后登录
2023-7-9

初级热心勋章 初级信用勋章 中级热心勋章

楼主
nelsoncwlee 发表于 2015-8-20 18:22:38 |AI写论文

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a comprehensive, highly usable, and clearly organized resource to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology.

Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. The field bible for infosecurity professionals, this book introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.

You will understand how to:
Identify inappropriate uses of corporate IT
Examine computing environments to identify and gather electronic evidence of wrongdoing
Secure corporate systems from further misuse
Identify individuals responsible for engaging in inappropriate acts taken with or without corporate computing systems
Protect and secure electronic evidence from intentional or accidental modification or destruction

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look under the hood and behind closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.Product Details
  • Paperback: 464 pages
  • Publisher: Auerbach Publications; 1 edition (January 23, 2002)
  • Language: English
  • ISBN-10: 0849309557
  • ISBN-13: 978-0849309557



Crc Press - Cyber Forensics A Field Manual For Collecting, Examining, And Preser.pdf (3.2 MB, 需要: 2 个论坛币)

二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:preserving collecting Examining reserving Forensic techniques technology computing corporate business

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加好友,备注ck
拉您进交流群
GMT+8, 2025-12-25 06:39