- Series: Artech House Computer Security Series
- Hardcover: 420 pages
- Publisher: Artech House (April 2003)
- Language: English
- ISBN-10: 1580533698
- ISBN-13: 978-1580533690
- Product Dimensions: 7 x 0.9 x 9 inches
- Shipping Weight: 2 pounds (View shipping rates and policies)
- Average Customer Review: 4.0 out of 5 stars See all reviews (1 customer review)
- Amazon Best Sellers Rank: #1,753,332 in Books (See Top 100 in Books)
Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
Computer and Intrusion Forensics (Artech House Computer Security Series)
Use the Amazon App to scan ISBNs and compare prices.
Excel 2016 For Dummies Video Training
Discover what Excel can do for you with self-paced video lessons from For Dummies. Learn more.
Frequently Bought Together
Customers Who Bought This Item Also Bought
Top Customer Reviews
This book provides a good overview of tool techniques, but does not give many details on how the techniques would actually be done with any tool. A detailed overview of three tools are given, but two of them are available to law enforcement only. The reader will finish this book with a solid understanding of the process that occurs during a computer investigation, but will still need additional books or training to start performing an investigation.
The chapter on fraud is very informative, as the topic is not covered in other digital forensic books and the skills will likely be helpful for most investigators in the future. The "Computer Forensics in Law Enforcement and National Security" chapter describes the investigation process that any investigator would find useful, not just law enforcement as the title suggests. The "Intrusion Detection and Intrusion Forensics" chapter gives an overview of Intrusion Detection Systems and Logging, but little is mentioned on how to confirm an intrusion while minimizing the amount of evidence that is modified.
This book will be useful as a first book to a new investigator who is looking to learn about the digital forensic process. This book will also be useful for technical managers and supervisors who will need to understand what their investigators are doing.