Logo

Forensic Discovery by Dan Farmer, Wietse Venema

Large book cover: Forensic Discovery

Forensic Discovery
by

Publisher: Addison-Wesley Professional
ISBN/ASIN: 020163497X
ISBN-13: 9780201634976
Number of pages: 240

Description:
The premise of the book is that forensic information can be found everywhere you look. With this guiding principle in mind we develop tools to collect information from obvious and not so obvious sources, we walk through analyses of real intrusions in detail, and we discuss the limitations of our approach. The target audience of the book is anyone who wants to deepen their understanding of how computer systems work, as well as anyone who is likely to become involved with the technical aspects of computer intrusion or system analysis. These are not only system administrators, incident responders, other computer security professionals, or forensic analysts, but also anyone who is concerned about the impact of computer forensics on privacy.

Home page url

Download or read it online for free here:
Download link
(420KB, ZIP/HTML)

Similar books

Book cover: Firewalls CompleteFirewalls Complete
by - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
(7219 views)
Book cover: Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by - Puget Sound Software
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(9213 views)
Book cover: Intrusion Detection with SNORTIntrusion Detection with SNORT
by - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(10563 views)
Book cover: Improving Web Application Security: Threats and CountermeasuresImproving Web Application Security: Threats and Countermeasures
by - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(11186 views)