Skip to main content

Books in Computer forensics

11-20 of 43 results in All results

Designing and Building Security Operations Center

  • 1st Edition
  • November 6, 2014
  • David Nathans
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 8 9 9 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 0 9 6 - 9
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.

Malware Forensics Field Guide for Linux Systems

  • 1st Edition
  • December 7, 2013
  • Eoghan Casey + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 4 7 0 - 0
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 4 7 1 - 7
Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program. This book will appeal to computer forensic investigators, analysts, and specialists.

Cloud Storage Forensics

  • 1st Edition
  • November 16, 2013
  • Darren Quick + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 7 0 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 9 1 - 0
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.

Computer Incident Response and Forensics Team Management

  • 1st Edition
  • November 8, 2013
  • Leighton Johnson
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 6 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 7 2 5 - 9
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

Unified Communications Forensics

  • 1st Edition
  • October 7, 2013
  • Nicholas Mr. Grant + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 2 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 6 0 5 - 4
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: • analysis of forensic artifacts in common UC attacks • an in-depth look at established UC technologies and attack exploits • hands-on understanding of UC attack vectors and associated countermeasures • companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

  • 1st Edition
  • March 8, 2013
  • Eoghan Casey + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 9 5 0 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 4 8 9 - 0
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

Placing the Suspect Behind the Keyboard

  • 1st Edition
  • February 1, 2013
  • Brett Shavers
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 8 5 - 9
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 8 4 - 2
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

Malware Forensics Field Guide for Windows Systems

  • 1st Edition
  • May 11, 2012
  • Cameron H. Malin + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 4 7 2 - 4
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists.

The Basics of Digital Forensics

  • 1st Edition
  • February 24, 2012
  • John Sammons
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 6 2 - 9
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations. This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available. This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Windows Forensic Analysis Toolkit

  • 3rd Edition
  • January 27, 2012
  • Harlan Carvey
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 7 2 8 - 2
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 provides an overview of live and postmortem response collection and analysis methodologies for Windows 7. It considers the core investigative and analysis concepts that are critical to the work of professionals within the digital forensic analysis community, as well as the need for immediate response once an incident has been identified. Organized into eight chapters, the book discusses Volume Shadow Copies (VSCs) in the context of digital forensics and explains how analysts can access the wealth of information available in VSCs without interacting with the live system or purchasing expensive solutions. It also describes files and data structures that are new to Windows 7 (or Vista), Windows Registry Forensics, how the presence of malware within an image acquired from a Windows system can be detected, the idea of timeline analysis as applied to digital forensic analysis, and concepts and techniques that are often associated with dynamic malware analysis. Also included are several tools written in the Perl scripting language, accompanied by Windows executables. This book will prove useful to digital forensic analysts, incident responders, law enforcement officers, students, researchers, system administrators, hobbyists, or anyone with an interest in digital forensic analysis of Windows 7 systems.