Forensic course development: one year later
CITC5 '04 Proceedings of the 5th conference on Information technology education
Establishing network computer forensics classes
Proceedings of the 1st annual conference on Information security curriculum development
Computer forensics laboratory and tools
Journal of Computing Sciences in Colleges
Investigating sophisticated security breaches
Communications of the ACM - Next-generation cyber forensics
Digital forensics laboratory projects
Journal of Computing Sciences in Colleges
A computer forensics minor curriculum proposal
Journal of Computing Sciences in Colleges
Internet forensics on the basis of evidence gathering with Peep attacks
Computer Standards & Interfaces
Forensic analysis of SCADA systems and networks
International Journal of Security and Networks
Semantics for a domain-specific language for the digital forensics domain
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
A Term Distribution Visualization Approach to Digital Forensic String Search
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Forensic Extraction of EFS-Encrypted Files in Live System Investigation
Journal of Digital Forensic Practice
Auditing Hash Sets: Lessons Learned from Jurassic Park
Journal of Digital Forensic Practice
Palantir: a framework for collaborative incident response and investigation
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Methodology and Tools of IS Audit and Computer Forensics --- The Common Denominator
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A stable evidence collection procedure of a volatile data in research
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Windows operating systems agnostic memory analysis
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A hierarchical, objectives-based framework for the digital investigations process
Digital Investigation: The International Journal of Digital Forensics & Incident Response
The Ethics of Cyberweapons in Warfare
International Journal of Technoethics
Hi-index | 0.00 |
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.Table of contents Part I: Introduction 1: Real-World Incidents 2: Introduction to the Incident Response Process 3: Preparing for Incident Response 4: After Detection of an Incident Part II: Data Collection 5: Live Data Collection from Windows Systems 6: Live Data Collection from Unix Systems 7: Forensic Duplication 8: Collecting Network-based Evidence 9: Evidence Handling Part III: Data Analysis 10: Computer System Storage Fundamentals 11: Data Analysis Techniques 12: Investigating Windows Systems 13: Investigating Unix Systems 14: Analyzing Network Traffic 15: Investigating Hacker Tools 16: Investigating Routers 17: Writing Computer Forensic Reports Part IV: Appendixes A: Answers to Questions B: Incident Response Forms