Incident Response: Investigating Computer Crime
暂无分享,去创建一个
From the Publisher:
This is one of the first books available that explains what to do after you've been hacked. Written by FBI insiders,this book reveals the computer forensics process and offers authoritative solutions designed to counteract and conquer hacker attacks.
Learn secrets and strategies for recovering from computer crime incidents Respond to security breaches and hacker attacks the right way with help from this insightful and practical guide. You'll get details on the entire computer forensic process and learn the importance of following specific procedures immediately after a computer crime incident occurs. Investigate various software including UNIX,Windows NT,Windows 2000,and application servers. Packed with technical examples and loads of how-to scenarios,this book will show you how to recognize unauthorized access,uncover unusual or hidden files,and monitor Web traffic. Detailed,authoritative,and up to dateIncident Response is the only book you need.
Plan and prepare for all stages of an investigationincluding detection,initial response,management interaction,and more Learn the importance of evidence handling and storage Perform a "trap and trace" and learn network protocols Monitor network traffic and detect illicit servers and covert channels Investigate Web server attacks,DNS attacks,and router attacks