Cyber crime investigator's field guide

"Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but...

Full description

Saved in:  
Bibliographic Details
Main Author: Middleton, Bruce (Author)
Format: Electronic/Print Book
Language:English
Published: Boca Raton London New York CRC Press 2022
In:Year: 2022
Edition:Third edition
Online Access: Table of Contents
Blurb
Volltext (doi)
Availability in Tübingen:Present in Tübingen.
UB: KB 21 A 2626
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:
Related Items:Erscheint auch als: 1801258449
Description
Summary:"Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but there continues to be a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Third Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cybercrime. This volume is also well constructed for use in a college classroom environment, with questions at the end of each chapter (a separate answer guide is available for instructors). This volume also offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, IOC's (Indicator's of Compromise), UNIX / Linux commands, PowerShell commands, Windows commands, Cisco commands, and more. Also included in this 3rd edition is a section on rail transportation security, a synopsis of laws focused on cybercrime, Python 3.X programs, PowerShell programs, WireShark PCAP file analysis, use of Kali Linux tools, and more. Features: Analyses of the usage of the latest evidence collection and analysis tools Covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence"--
Item Description:Includes bibliographical references and index
Physical Description:xiii, 338 Seiten Illustrationen
ISBN:9780367682309
9781032301891
DOI:10.1201/9781003134817