Forensic Discovery (Dan Farmer, et al)

 
0.0 (0)
Forensic Discovery (Dan Farmer, et al)

As IT and law enforcement workers battle an epidemic of computer crime, computer forensics—the art and science of acquiring and analyzing digital evidence, reconstructing data and assaults, and identifying perpetrators—becomes even more crucial.

Two widely respected professionals provide a thorough and practical overview of the topic of Forensic Discovery.

This book introduces a potent method that can frequently recover evidence thought to be lost forever and covers both the theory and practical application of computer forensics.

The writers discuss everything from file systems to memory and kernel hacks to viruses, drawing on their significant first-hand knowledge. They debunk a wide range of myths about computer forensics that frequently get in the way of success. The book's detailed examples from Solaris, FreeBSD, Linux, and Microsoft Windows are included, along with step-by-step instructions for creating one's own forensic tools.

The authors of this book are exceptionally qualified: Some of the most well-known security tools ever built, such as the renowned SATAN network scanner and the potent Coroner's Toolkit for analyzing UNIX break-ins, were personally developed by them.

Ebook Details

About the Authors
  • A pioneer in the creation of vulnerability scanners for Unix operating systems and computer networks, Dan Farmer is an American programmer and computer security researcher.
  • The Postfix email system was created by Dutch programmer and physicist Wietse Venom. Additionally, he co-wrote TCP Wrapper and worked with Dan Farmer to create the SATAN and The Coroner's Toolkit computer security tools.
Published
Published Date / Year
1 edition (January 9, 2005)
Hardcover
240 pages
eBook Format
HTML and PDF
ISBN-10
020163497X
ISBN-13
978-0201634976

Similar Programming & Computer Books

RSA暗号体験入門 - Introduction to RSA Crypto Experience (CyberSyndrome)
In this free programming book, public key and RSA cryptography are primarily explained for beginners and intermediate users.  
Java 2 Network Security (Marco Pistoia, et al.)
With thorough coverage of the new Java 2 security models, this book offers the entire insiders' guide to protecting Java 2 enterprise applications. Developed to assist you in incorporating...
Learn Ethical Hacking from Scratch (Zaid Sabih)
The fundamentals of ethical hacking, how to hack safely and legally, how to install Kali Linux and use the Linux terminal are covered at the beginning of this book....
Watermarking - Volume 2 (Mithun Das Gupta)
The books in this collection contain some of the most recent advancements in the watermarking industry. To make this work a significant contribution to science, authors with various backgrounds...
Watermarking - Volume 1 (Mithun Das Gupta)
Some of the most recent advancements in the watermarking discipline are presented in this collection of books. To make this book a significant contribution to scientific study, authors from...
Image Steganography and Steganalysis (Philip Bateman)
The art of steganography is two-way secret communication that hides both the existence and the content of a message.
Textbook of Forensic Medicine and Toxicology (Nageshkumar G. Rao)
For forensic science undergraduate students, this book is thorough. Students pursuing careers in the ayurveda, homoeopathic, unani, and siddha systems of medicine might also find it helpful. ...
Concise Textbook Forensic Medicine Toxicology (R. K. Sharma, et al)
This free programming book has been prepared succinctly to aid the students in understanding the subject and is intended to give the reader with fundamental and applicable knowledge of...
Forensic Medicine - From Old Problems to New Challenges (Duarte Nuno Vieira)
The field of forensic medicine is one that is continually being updated and improved, not only as a consequence of scientific and technological advancements (which have nearly instantaneous effects),...
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Christian Rathgeb, et al)
The first thorough compilation of research on the popular subject of digital face alteration, including DeepFakes, Face Morphing, and Reenactment, is offered in this open access book. ...

Others Programming Books by Addison-Wesley Professional

Java Look and Feel Design Guidelines: Advanced Topics (Sun Microsystems Inc.)
gives programmers the specifications for using the Java Foundation Classes to create user interfaces (JFC). emphasizes the appearance and feel of native Java (called Metal). establishes the visual design...
Java Look and Feel Design Guidelines, 2nd Edition (Sun Microsystems Inc.)
Anyone involved in the process of developing cross-platform Java applications and applets should read Java Look and Feel Design Guidelines.  
The JFC Swing Tutorial: A Guide to Constructing GUIs (Kathy Walrath, et al)
The JFC Swing Tutorial has been completely updated and redesigned to reflect the most recent changes to the Java 2 platform and JFC Swing API. Working closely with the...
The Unicode Standard, Version 5.0 and 12.0.0 (The Unicode Consortium)
This is the one book that every developer who uses Unicode needs.  
C# Design Patterns: A Tutorial (James W. Cooper)
Using some of the most popular design patterns, this book teaches you how to write C# programs. It also acts as a brief introduction to the new C# programming...
Programming Embedded Systems using C (Mikael J. Pont)
An open-source manual made for C programmers who have desktop experience. The control of port pins and the reading of switches are two fundamental concepts that are explored in...
A Book on C: Programming in C (Al Kelley, et al)
A Book on C, based on the ANSI C standard, is a thorough tutorial and reference book on the programming language C written by best-selling authors Al Kelley and...
The C Book: Featuring the ANSI C Standard, 2nd Edition (Mike Banahan, et al)
This free programming book provides a structured introduction to the C programming language. It is intended for professionals and students who have some background in high-level languages. Features *includes...
Java Design Patterns: A Tutorial (James W. Cooper)
The tutorial resource you need is right here in this free programming book. It aids in your understanding of the nature and function of design patterns and is easily...
An Introduction to the Analysis of Algorithms, 2nd Edition (Robert Sedgewick, et al)
The book's comprehensive, self-contained coverage will give readers the knowledge they need to stay up to date on new research as well as help them understand the difficulties facing...
Text Processing in Python (David Mertz)
This book is a comprehensive, example-driven tutorial that shows programmers how to use the Python language to carry out a variety of text-processing tasks.
Object-Oriented System Development (Dennis deChampeaux, et al.)
This book will help software engineers, project managers, and tool creators better comprehend the function that analysis and design play in the creation of object-oriented (OO) software. ...
Firewalls and Internet Security: Repelling the Wily Hacker (William R. Cheswick, et al.)
This book offers helpful tips and useful tools for safeguarding our computers. You will discover how to devise and carry out a security policy that will thwart even the...
Essentials of the Java Programming Language: A Hands-On Guide (Monica Pawlan)
Numerous programmers want to learn Java quickly and practically, with the least amount of theory and complexity. The ideal place for students to start is with Essentials of the...
The Art of Computer Programming, Volume 1, Fascicle 1: MMIX -- A RISC Computer for the New Millennium (Donald Ervin Knuth)
This first fascicle will eventually be incorporated into the fourth edition of The Art of Computer Programming, Volume 1, Third Edition: Fundamental Algorithms.
APIs on Rails - Building REST APIs with Rails (Abraham Kuri)
This book's objective is to offer guidance on how to create a RESTful API using industry best practices and the author's personal experience.
Servlets and JavaServer Pages: The J2EE Technology Web Tier (Jayson Falkner, et al)
The JSP W3C expert committee members who wrote this book are considered the foremost authorities on the JSP 2.0 and Servlets 2.4 specifications. The comprehensive manual for creating web...
Programming Pearls, 2nd Edition (Jon Bentley)
This book is a compilation of essays on a dazzling element of software: programming gems with roots in intelligence and creativity rather than in sound engineering. ...
Processing XML with Java: A Guide to SAX, DOM, JDOM, JAXP, and TrAX (Elliotte Rusty Harold)
An extensive manual for creating Java programs that read and write XML documents. demonstrates for programmers how to use XSLT to incorporate XML into their applications, as well as...
Application-Specific Integrated Circuits (Michael Smith)
The most recent techniques for designing VLSI systems are covered in detail in this comprehensive book on application-specific integrated circuits (ASICs).

User reviews

There are no user reviews for this listing.
Ratings
Rate this Book
Comments