EC-Council | ||||
Cengage Learning | ||||
2010 | ||||
English | ||||
394 pages | ||||
23.98 MB | ||||
[tab] [content title="Summary"] The **Computer Forensic Series** by EC-Council is an essential resource for individuals interested in mastering the skills needed to identify, track, and prosecute cyber criminals. This comprehensive five-book series focuses on **Computer Hacking Forensic Investigation (CHFI)**, offering in-depth knowledge of how to detect attacks, collect evidence in a forensically sound manner, and prepare that evidence for legal action. The series prepares students and professionals to handle computer crime investigations, cybercrime prevention, and legal procedures in digital forensics. ### Key Features of the **Computer Forensic Series**: - **Comprehensive Coverage of Forensic Investigation**: The series delves into the essential aspects of computer forensics, including how to detect, preserve, and analyze evidence from digital devices. It also explores advanced techniques for tracking cybercriminals, profiling intruders' footprints, and recovering data that may be vital for prosecution. - **Focus on Real-World Cybercrime**: The books cover a broad range of topics, from investigating network intrusions and web attacks to handling corporate espionage cases and denial-of-service (DoS) attacks. Each book provides practical knowledge that can be directly applied to real-world forensic investigations. - **Advanced Forensic Techniques**: Learners are introduced to advanced investigative techniques used to gather and analyze digital evidence, including the collection of network traffic, identification of attack vectors, and detection of illicit activities across systems. This includes the use of specific tools and methodologies for forensic analysis. - **Legal Aspects and Courtroom Preparation**: The series places a significant emphasis on preparing evidence for legal action. Investigators are taught how to document and preserve digital evidence to ensure its admissibility in court. The goal is not just to understand forensic techniques but also to be prepared to support investigations and prosecutions in the legal system. ### Books in the **Computer Forensic Series**: 1. **Computer Hacking Forensic Investigation (CHFI)**: This core book in the series provides a detailed introduction to computer forensic investigation, offering insights into how to track cybercriminals, recover lost data, and secure digital evidence. It covers topics like digital evidence collection, analyzing forensic data, and following an attacker's path through a compromised system. 2. **Network Intrusions and Cybercrime**: This volume focuses on network-related cybercrime and intrusion investigation techniques. It covers network traffic analysis, identifying various types of web-based attacks, investigating denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, and understanding how cybercriminals use networks to exploit vulnerabilities. 3. **Investigating Web Attacks**: This book details how to investigate cybercrimes related to websites and web applications. Topics include detecting common web vulnerabilities such as SQL injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), and analyzing logs and data to identify attackers who exploit these vulnerabilities. 4. **Corporate Espionage**: Corporate espionage has become a significant issue for businesses in the digital age. This volume outlines forensic techniques for investigating corporate espionage, including how to trace stolen data, identify insider threats, and track the digital footprint of an attacker who steals proprietary or confidential business information. 5. **Forensic Tools and Techniques**: This volume introduces the various forensic tools and techniques available to investigators, such as disk imaging tools, data recovery software, and tools for examining file systems and registries. It also covers how to use these tools in a forensically sound manner to avoid compromising evidence. ### Key Topics Covered: - **Forensic Evidence Collection**: Best practices for collecting digital evidence in a way that preserves its integrity for use in court. This includes acquiring hard drives, volatile memory, and network traffic data. - **Network Traffic Analysis**: Tools and techniques used to monitor and analyze network activity during an investigation. This includes identifying intrusion attempts, tracing attacker routes, and analyzing logs. - **Digital Evidence Analysis**: How to analyze data from a variety of sources, including computers, smartphones, and cloud services. Techniques for recovering deleted files and data from damaged systems are also discussed. - **Investigating Web-Based Attacks**: A focus on examining attacks targeting websites and web applications, understanding how attackers exploit vulnerabilities, and gathering evidence from logs and databases. - **Corporate Espionage Investigations**: Techniques for tracing theft of intellectual property and corporate secrets, including methods for identifying insiders who may be responsible for information leaks. - **Incident Response and Forensic Reporting**: Preparing and reporting forensic findings, including how to write detailed reports that can be presented in a courtroom setting. ### Who Should Read the **Computer Forensic Series**? - **Forensic Investigators**: Professionals involved in investigating cybercrime and digital forensics. The series offers practical techniques for collecting and analyzing evidence in digital investigations. - **Law Enforcement and Legal Professionals**: Police officers, federal investigators, and legal professionals who need to understand how digital evidence is handled and how to present it in court. - **Cybersecurity Professionals**: Individuals working in cybersecurity who need to know how to respond to breaches and attacks, track intruders, and gather evidence to support an organization's defense. - **C|HFI Certification Candidates**: The series provides a comprehensive study resource for those preparing for the **Certified Hacking Forensic Investigator (C|HFI)** certification exam offered by EC-Council. ### Why This Series is Important: - **Practical, Real-World Application**: The books are filled with practical examples and case studies that demonstrate how forensic techniques are used to track down cybercriminals, recover evidence, and assist in legal prosecutions. - **Legal and Ethical Focus**: The series emphasizes the importance of handling digital evidence in a way that respects legal and ethical guidelines, ensuring that evidence remains admissible in court. - **Comprehensive Coverage**: With a focus on a wide variety of cybercrimes, including network intrusions, web attacks, corporate espionage, and more, the series provides a holistic understanding of the cybercrime landscape and how to address it. ### Conclusion: The **Computer Forensic Series** by EC-Council is a must-have resource for anyone involved in the field of digital forensics or cybersecurity. It offers a comprehensive, hands-on approach to forensic investigation, helping readers to gain the skills necessary to track cybercriminals, recover critical evidence, and present that evidence in a court of law. Whether you're a professional investigator, a student pursuing certification, or a cybersecurity expert, this series provides invaluable knowledge and tools for investigating cybercrimes and supporting successful prosecutions. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]
[facebook src="bibliosciencesorg"/]
Key-Words: Télécharger Computer forensics: investigating network intrusions and cybercrime EBOOK PDF EPUB DJVU . Download Computer forensics: investigating network intrusions and cybercrime EBOOK PDF EPUB DJVU .