资源描述:
《2010 mcgraw hill hacking exposed computer forensics 2nd edition november 2009 (attica)外语英文电子书》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、HACKINGEXPOSED™COMPUTERFORENSICSSECONDEDITIONREVIEWSThisbookprovidestherightmixofpracticalhow-toknowledgeinastraightforward,informativefashionthattiesallthecomplexpiecestogetherwithreal-worldcasestudies.Withsomanybooksonthetopicofcomputerforensics,HackingExposedComputerForensics,S
2、econdEdition,deliversthemostvaluableinsightonthemarket.Theauthorscuttothechaseofwhatpeoplemustunderstandtoeffectivelyperformcomputerforensicinvestigations.BrianH.Karney,COO,AccessDataCorporation“HackingExposedComputerForensicsisamust-readforinformationsecurityprofessionalswhowantt
3、odeveloptheirknowledgeofcomputerforensics.JasonFruge,DirectorofConsultingServices,FishnetSecurityComputerforensicshasbecomeincreasinglyimportanttomodernincidentrespondersattemptingtodefendourdigitalcastles.HackingExposedComputerForensics,SecondEdition,picksupwherethefirsteditionle
4、ftoffandprovidesavaluablereference,usefultobothbeginningandseasonedforensicprofessionals.Ipickedupseveralnewtricksfromthisbook,whichIamalreadyputtingtouse.—MontyMcDougal,RaytheonInformationSecuritySolutions,andauthoroftheWindowsForensicToolchest(WFT)(www.foolmoon.net)HackingExpose
5、dComputerForensics,SecondEdition,isanessentialreferenceforbothnewandseasonedinvestigators.Thesecondeditioncontinuestoprovidevaluableinformationinaformatthatiseasytounderstandandreference.SeanConover,CISSP,CCE,EnCEThisbookisanoutstandingpointofreferenceforcomputerforensicsandcertai
6、nlyamust-haveadditiontoyourforensicarsenal.BrandonFoley,ManagerofEnterpriseITSecurity,Harrah’sOperatingCo.StartsoutwiththebasicsthengetsDEEPtechnically.TheadditionofIPtheftandfraudissuesistimelyandmakethissecondeditionthatmuchmorevaluable.Thisisacorebookformyentireforensicsgroup.C
7、hrisJoerg,CISSPCISA/M,DirectorofEnterpriseSecurity,MentorGraphicsCorporationAmust-readforexaminerssuddenlyfacedwithaMacorLinuxexamafterspendingthemajorityoftheirtimeanalyzingWindowssystems.AnthonyAdkison,CriminalInvestigatorandComputerForensicExaminer,CFCE/EnCE“Thisbookisapplicabl
8、etoforensicinvestigatorsseekingto