"This book is an absolute
must-read for anyone who plays in responding to computer security
events."
Marc J. Zwillinger,
former trial attorney with the U.S. Dept. of Justice, Computer Crime &
Intellectual Property
New and Updated Material:
- New
real-world scenarios throughout
- The
latest methods for collecting live data and investigating Windows and
UNIX systems
- Updated
information on forensic duplication
- New
chapter on emergency network security monitoring
- New
chapter on data preparation with details on hard drive interfaces and
data storage principles
- New
chapter on data extraction and analysis
- The
latest techniques for analyzing network traffic
- Up-to-date
methods for investigating and assessing hacker tools
|