Computer Forensics Library Boxed Set 1st Edition

5 customer reviews
ISBN-13: 978-0321525642
ISBN-10: 0321525647
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Sell yours for a Gift Card
We'll buy it for $4.88
Learn More
Trade in now
Have one to sell? Sell on Amazon
Rent
$105.00
Due Date: Dec 20, 2015 Rental Details
FREE return shipping at the end of the semester.
In Stock. Rented from RentU , Fulfilled by Amazon
Access codes and supplements are not guaranteed with rentals.
List Price: $129.99 Save: $24.99 (19%)
To Rent, select Shipping State from options above
Amazon Price New from Used from
Paperback, August 20, 2007
"Please retry"
$143.55 $95.90
Unknown Binding
"Please retry"
More Buying Choices
6 New from $143.55 7 Used from $95.90
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


InterDesign Brand Store Awareness Textbooks

Editorial Reviews

From the Back Cover

 

About the Author

Keith J. Jones leads the computer forensics and electronic evidence discovery practices at Red Cliff Consulting. Formerly Foundstone's director of incident response and computer forensics, his book The Anti-Hacker Tool Kit (McGraw-Hill Osborne, 2002) is the definitive guide to securing critical applications.

Richard Bejtlich is a former Air Force intelligence officer, and is founder of TaoSecurity, a network security monitoring consultancy. He wrote the Tao of Network Security Monitoring (Addison-Wesley, 2005) and Extrusion Detection (Addison-Wesley, 2006).

Curtis W. Rose, a former counterintelligence special agent, is an executive vice president at Red Cliff Consulting where he leads research and development efforts and special projects, and where he provides support to criminal investigations and civil litigation. He was a contributing author or technical editor for several security books, including The Anti-Hacker Tool Kit, Network Security: The Complete Reference (McGraw-Hill Osborne, 2002), and Incident Response: Investigating Computer Crime, Second Edition (McGraw-Hill Osborne, 2002).

Dan Farmer is author of a variety of security programs and papers. He is currently chief technical officer of Elemental Security, a computer security software company. Together he and Wietse Venema, have written many of the world's leading information security and forensics packages, including the SATAN network security scanner and the Coroner's Toolkit.

Wietse Venema has written some of the world's most widely used software, including TCP Wrapper and the Postfix mail system. He is currently a research staff member at IBM Research. Together, he and Dan Farmer have written many of the world's leading information security and forensics packages, including the SATAN network security scanner and the Coroner's Toolkit.

Brian Carrier has authored several leading computer forensic tools, including The Sleuth Kit (formerly The @stake Sleuth Kit) and the Autopsy Forensic Browser. He has authored several peer-reviewed conference and journal papers and has created publicly available testing images for forensic tools. Currently pursuing a Ph.D. in computer science and digital forensics at Purdue University, he is also a research assistant at the Center for Education and Research in Information Assurance and Security (CERIAS) there. He formerly served as a research scientist at @stake and as the lead for the @stake Response Team and Digital Forensic Labs. Carrier has taught forensics, incident response, and file systems at SANS, FIRST, the @stake Academy, and SEARCH.
      Brian Carrier's Web site, http://www.digital-evidence.org, contains book updates and up-to-date URLs from the book's references.

NO_CONTENT_IN_FEATURE


Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Product Details

  • Paperback: 1392 pages
  • Publisher: Addison-Wesley Professional; 1 edition (August 20, 2007)
  • Language: English
  • ISBN-10: 0321525647
  • ISBN-13: 978-0321525642
  • Product Dimensions: 7.2 x 3.3 x 9.4 inches
  • Shipping Weight: 5.2 pounds
  • Average Customer Review: 4.8 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #1,658,741 in Books (See Top 100 in Books)

Important Information

Ingredients
Example Ingredients

Directions
Example Directions

Customer Reviews

5 star
80%
4 star
20%
3 star
0%
2 star
0%
1 star
0%
See all 5 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

6 of 6 people found the following review helpful By Michael Schuetter on May 16, 2008
Format: Paperback
As you can find in their individual reviews, each book received high marks on its own merit. Put together and this set of three books cannot be beat in the area of system and network forensics.

Although not entrenched in the area of forensics, I do feel that I have a strong technical background upon which to build. I found this series of books refocusing me to think more like a forensics investigator. Not only did I have the opportunity to dig deeper into specific technology areas, but it also reinforced the concepts through scenarios.

Not for the faint of heart, this practical set of books expects you to have a decent technical background to make the best use of it. If you are interested in taking your forensics know-how to the next level, this is a great reference set to be added to your library.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 6 people found the following review helpful By Amazon Customer on October 25, 2007
Format: Paperback
This set of books is very well written and provides a tremendous amount of information to the reader. I would recommend this set of books to anyone who wants to roll up their sleeves and truly get their hands dirty.

I would not recommend these books for the beginner as the material will quickly give one the feeling of "Drinking from a firehose" without a reasonable amount of knowledge going in. The authors do state that while the books are written to be easy to understand they are not for the beginner.
2 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Orv on November 3, 2012
Format: Paperback Verified Purchase
Everything you need with these 3 books! Great buy at great price! Whether using for a certification, exam, or just a resource everything is in these 3 books.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
For those that are really interested by what happens inside their computers, especially if they think that there is foul play somewhere inside. Also useful to understand the compiler generated code, and ways to tweak performance without dwelling upon assembly language. I recommend also: "Reversing, secrets of Reverse Engineering" by Eldad Eilam.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 1 people found the following review helpful By nadeem on February 13, 2015
Format: Paperback Verified Purchase
good collection but does not cover all aspects of digital forensic
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Want to discover more products? Check out these pages to see more: networks, linux security