Ebooks

Cyber Crime Investigators Field Guide~tqw~ darksiderg


  • Rate this torrent +  |  -

Torrent info

Name:Cyber Crime Investigators Field Guide~tqw~ darksiderg torrent

Total Size: 7.69 MB

Seeds: 3

Leechers: 1

Downloaded: 19

Torrent added: 2009-08-20 22:26:24

Share:Bookmark and Share



Torrent Files List


Cyber Crime Investigators Field Guide~tqw~ darksiderg (Size: 7.69 MB) (Files: 3)

 tracked_by_h33t_com.txt

0.02 KB

 Cyber Crime Investigator's Field Guide~tqw~_darksiderg.pdf

7.68 MB

 Cyber Crime Investigator's Field Guide~tqw~_darksiderg.nfo

2.56 KB
 

Torrent description

*******************************************************************************
Cyber Crime Investigator's Field Guide
*******************************************************************************

-------------------------------------------------------------------------------
General Information
-------------------------------------------------------------------------------
Type.................: Ebook
Part Size............: 8,056,784 bytes

-------------------------------------------------------------------------------
Post Information
-------------------------------------------------------------------------------
Posted by............: ~tqw~

-------------------------------------------------------------------------------
Release Notes
-------------------------------------------------------------------------------
Long gone are the days when a computer took up an entire room. Now we have
computers at home, laptops that travel just about anywhere, and data networks
that allow us to transmit information from virtually any location in a timely
and efficient manner. What have these advancements brought us? Another arena for
criminal activity. If someone wants to focus and target something, more than
likely they will obtain what they want. We shouldn't expect it to be any
different in cyberspace.

Table of Contents

1 The Initial Contact 1
2 Client Site Arrival 5
3 Evidence Collection Procedures 9
4 Evidence Collection and Analysis Tools 17
5 Password Recovery 77
6 Questions and Answers by Subject Area 81
7 Recommended Reference Materials 97
8 Case Study 103
App. A: Glossary 133
App. B Port Numbers Used by Malicious Trojan Horse Programs 137
App. C Attack Signatures 141
App. D UNIX/Linux Commands 143
App. E Cisco PIX Firewall Commands 159
App. F Discovering Unauthorized Access to Your Computer 165
App. G U.S. Department of Justice Search and Seizure Guidelines 169
The Author 335
Index 337

Product Details

* ISBN: 0849327687
* ISBN-13: 9780849327681
* Format: Hardcover, 296pp
* Publisher: CRC Press
* Pub. Date: January 2005
* Edition Description: REV
* Edition Number: 2

-------------------------------------------------------------------------------
Install Notes
-------------------------------------------------------------------------------
PDF Reader

related torrents

Torrent name

Size

Main Menu