Real Digital Forensics Computer Security and Incident Response, Keith J. Jones

Cover may not be exactly as depicted

Real Digital Forensics Computer Security and Incident Response, Keith J. Jones

by Keith J. Jones

Used & Rare price

SPECIAL SHIPPING CONSIDERATIONS FOR USED & RARE ITEMS.

Please see the special considerations for shipping Used & Rare items, including extended delivery times, possible import duties & taxes.

Delivered in 3-5 weeks

Publisher: Addison-Wesley Professional

Condition:

The following ISBNs are associated with this title:

ISBN - 10:0321240693

ISBN - 13:9780321240699

Seller Comments:

From the Publisher

Preface Preface Our Purpose and Approach Welcome to the book named Real Digital Forensics. When we conceived this book, we wanted to give forensic investigators more than words to learn new skills. Many people express to us in our classes and speaking engagements a simple sentence we have heard hundreds of times: "How do I get into the field of computer forensics?" In our opinion, you cannot learn forensics unless you have hands-on practical experience. This brings up a more important question we usually hear next: "How do I get my hands on data to gain that experience?" This question is much more difficult to answer because the only data most people have to practice with comes from real cases-and we all know that our clients do not want their data disseminated for learning tools! Therefore, it is difficult for most people to find data to practice with in order to sharpen their computer forensic skills. To answer this second question, we decided to publish this book with a DVD containing realistic evidence collected from several fictitious scenarios for the sole purpose of teaching the computer forensic tradecraft. Most of the scenarios you will find throughout this book are very similar to types of cases that we investigate every day. We used the same tools attackers use when establishing a foothold in your network, the same methods rogue employees make use of to steal your trade secrets, and the same media we typically collect when we created the evidence files found on the DVD. Although we attempted to thoroughly investigate each company name we used for our scenarios, we want to state that none of this data was collected from computers within companies with coincidentally similar names or IP addresses. The book begins by presenting methodologies used for the collection and analysis of computer forensic data. Then the book presents methods for compiling tool kits you can take with you to the scene of a computer-related crime. The book concludes by providing methodologies for deeper forensic analysis and solutions for when you run into other types of computer media such as USB memory and Palm devices. Although computer forensic software tends to be commercially dominated, which means you would have to pay a hefty licensing fee just to get your feet wet, we wholeheartedly believe in open source because of the documented methodologies and availability of the source code. Reproducibility and documentation of methodologies is the cornerstone of any forensic science. Therefore, you will find that most techniques we recommend utilize a freely available and publicly documented toolset. This will enable you to examine the evidence found on the DVD without having to purchase additional software. When we do talk about commercial software to help round out your knowledge base, we will point it out in the text so that you are fully aware. You will find that this book takes a practical, hands-on approach to solving problems that we frequently encounter when performing computer-related investigations. This book will not contain pages and pages about the theory of computer forensics. What it will contain are techniques you can employ immediately to solve your problems when performing an analysis. We hope you enjoy the Real Digital Forensicsexperience. The Prerequisites and Target Audiences Some of the techniques we discuss in this book are considered more advanced than common forensic knowledge. If you are just starting out in the computer forensic field, we suggest a basic understanding of computer forensics to more fully enjoy the content within this book. For an understanding of computer forensics that will help you work through the investigations throughout this book, we recommend you review the following publications: The Tao of Network Security Monitoring: Beyond Intrusion Detectionby Richard Bejtlich Extrusion Detection: Security Monitoring for Internal Intrusionsby Richard Bejtlich Incident Response: Investigating Computer Crimeby Kevin Mandia, Chris Prosise, and Matt Pepe File System Forensic Analysisby Brian Carrier Computer Forensicsby Kruse, Warren and Jay Heiser About the Art Due to the complex nature of the data we discuss, some of our screenshots may appear small in this book and may be difficult to read. We have made all the artwork available at [a href="http://www.realdigitalforensics.com" target="_blank" target=_new>http://www.realdigitalforensics.com .How To Use the DVD All the evidence collected for each of the scenarios presented throughout the book is loaded on the DVD. If you insert the DVD into a Windows machine, a new drive such as D: or E: will appear. If you insert the DVD into a Unix machine, you will need to mount the file system using the mount command, such as: ?mount /dev/cdrom /mnt/realdigitalforensics re>Off of the DVD root directory, you will find another directory named after the scenario. Typically this directory has the same name as the victim company s name. For example, to find the "JBR Bank s Intrusion" scenario, you would navigate to the jbr_bank directory on the DVD. Within the scenario directory, you will find more subdirectories. Each subdirectory contains a particular type of evidence that the investigator collected. If the investigator acquired a forensic duplication, you can find the corresponding data in the forensic_duplication directory. If the responder performed a live response, the live_response directory will contain the relevant data, and so on. Most of the data on the DVD is stored in native format. The live response data is plain text, memory dumps are binary files, and so on. When you want to examine a forensic duplication, you will notice that the files are compressed. This was done because the duplications can be up to 4 GB in size when they are uncompressed, which would not fit on a single DVD. Therefore, be warned-you may want to have 10 to 20 GB of working room on your hard drive when you analyze this evidence.To analyze a forensic duplication, you must first copy the evidence from the DVD to your local hard drive and uncompress the duplication. The forensic duplications can be uncompressed with Winziphttp://www.winzip.com in Windows or unzip/gzip in Unix. The data on the DVD represents our best efforts to mirror the real world scenarios we encounter every day. We were forced, unfortunately, to perform some post processing so that we did not distribute copies of commercial software. Therefore, some system-related files on the victim machines containing the Windows operating system had zeros written over it. The original size of the file and directory structure we kept "as is" to simulate a real machine. With that in mind, please load up your DVD and follow along with our many examples. We invite you to visit our Web site,http://www.realdigitalforensics.com , for updates to the text, links to forensics tools, and other information to make your incident response and forensics duties more pleasurable. /> Copyright Pearson Education. All rights reserved.

Used books: 8 more copies of this item are available

Real Digital Forensics: Computer

Real Digital Forensics: Computer

by Curtis W. Richard; Rose Keith J.; Bejtlich Jones

Delivered in 3-5 weeks

Condition:

Format: Paperback

Publisher: Addison-Wesley Professional

Seller Comments:

Good Condition item. We strive to provide the best shopping experience with every item we sell. Satisfaction guaranteed! ! Ships from US. Please allow 1-3 weeks for delivery outside US.

$78.21

Real Digital Forensics: Computer Security and Incident Response

Real Digital Forensics: Computer Security and Incident Response

by Keith J Jones

Delivered in 3-5 weeks

Condition:

Format: Other

Publisher: Addison-Wesley Professional

$95.64

Real Digital Forensics: Computer Security and Incident Response

Real Digital Forensics: Computer Security and Incident Response

by Keith J. Jones Richard Bejtlich Curtis W. Rose

Delivered in 3-5 weeks

Condition:

Format: Paperback

Publisher: Addison Wesley

Seller Comments:

New copy In stock and despatched from the UK. NB: All orders from the USA and Canada have to be sent via the Alibris depot in the UK and are then sent to the customer by Alibris in the USA. Until the book is received in the USA Alibris warehouse your order will show as Pending. Expected delivery dates are contained in the Help section of this site and in the confirmation email.

$97.46

Real Digital Forensics: Computer Security and Incident Response, 1/E

Real Digital Forensics: Computer Security and Incident Response, 1/E

by Pearson Education

Delivered in 3-5 weeks

Condition:

Format:

Publisher: Addison-Wesley Professional

$107.46

Real Digital Forensics

Real Digital Forensics

by Richard Davidson

Delivered in 3-5 weeks

Condition:

Format: other

Publisher: Pearson

Seller Comments:

BRAND NEW! ONLY Expedited orders are shipped with tracking number! *WE DO NOT SHIP TO PO BOX* Please allow up to 14 days delivery for order with standard shipping. SHIPPED FROM MULTIPLE LOCATIONS.

$107.80

Real Digital Forensics: Computer Security and Incident Response

Real Digital Forensics: Computer Security and Incident Response

by Curtis W. Richard; Rose Keith J.; Bejtlich Jones

Delivered in 3-5 weeks

Condition:

Format: PAPERBACK

Publisher: Addison-Wesley Professional

Seller Comments:

0321240693 Good condition books may have signs of cover wear and/or marks on corners and page edges. Inside pages may have highlighting, writing and underlining. Supplemental materials such as CDs, Access Codes, and Course Packs are not guaranteed to be included. Ships fast from Ontario, delivery is between 5-10 business days. Satisfaction guaranteed!

$117.01

Real Digital Forensics: Computer Security and Incident Response

Real Digital Forensics: Computer Security and Incident Response

by Curtis W. Rose Richard Bejtlich Keith J. Jones

Delivered in 3-5 weeks

Condition:

Format: Paperback

Publisher: Addison Wesley

Seller Comments:

BRAND NEW BOOK! Shipped within 24-48 hours. Normal delivery time is 5-12 days.

$141.22

Real Digital Forensics: Computer Security and Incident Response

Real Digital Forensics: Computer Security and Incident Response

by Keith J Jones

Delivered in 3-5 weeks

Condition:

Format: Other

Publisher: Addison-Wesley Professional

$261.19