9780321240699
Real Digital Forensics: Computer Security and Incident Response share button
Keith Jones
Genre Nonfiction
Format Paperback
Dimensions 7.00 (w) x 9.25 (h) x 1.44 (d)
Pages 688
Publisher Addison-Wesley
Publication Date September 2005
ISBN 9780321240699
Book ISBN 10 0321240693
About Book

You can't succeed in the field of computer forensics without hands-on practice—and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice.

From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.

You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.

Inside, you will find in-depth information on the following areas:

  • Responding to live incidents in both Windows and Unix environments
  • Determining whether an attack has actually occurred
  • Assembling a toolkit you can take to the scene of a computer-related crime
  • Analyzing volatile data, nonvolatile data, and files of unknown origin
  • Safely performing and documenting forensic duplications
  • Collecting and analyzing network-based evidence in Windows and Unix environments
  • Reconstructing Web browsing, e-mail activity, and Windows Registry changes
  • Tracing domain name ownership and the source of e-mails
  • Duplicating and analyzing the contents of PDAs and flash memory devices

The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.

Reviews

From Barnes & Noble

The Barnes & Noble Review
Thousands of security and law enforcement professionals desperately want to master digital forensics. Hands-on experience is crucial, but where can you get it? Here: Real Digital Forensics. Three world-class IT security experts have assembled five intensely realistic, detailed investigations for you to perform. As you do, they’ll teach you how to use the open-source tools and methods they personally rely on. The accompanying DVD-ROM contains all the evidence you’ll need: binary memory dumps, log files, “stolen” PDA data, you name it.

Along the way, you'll perform “live response” to attacks; duplicate hard drives and capture network-based evidence; trace emails and domain name ownership; and learn how to preserve the chain of evidence. You'll work in both Windows and Linux environments. And by the time you're done, you'll be miles ahead of folks who merely read about this stuff. Bill Camarda, from the November 2005 Read Only