tailieunhanh - Cyber Forensics

This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the authors and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher | CYBER FORENSICS A Field Manual for Collecting Examining and Preserving Evidence of Computer Crimes Albert J. Marcella Robert S. Greenfield Cyber Forensics Table of Contents Cyber Forensics A Field Manual for Collecting Examining and Preserving Evidence of Computer Dimensions of the Computer Works Section I Cyber Chapter .13 Chapter 1 The Goal of the Forensic Why Internet Exceeds Inappropriate Non-Work-Related Usage of Company Theft of Violation of Security Intellectual Property Electronic Establishing a Basis or Justification to Determine the Impact of Who to Call If You Are the Auditor Obligations Reporting Escalation Time Chapter 2 How to Begin a Non-Liturgical Forensic Isolation of History Temporary Internet Tracking of Logon Duration and Recent Documents Tracking of Illicit Software Installation and i Table of Contents Chapter 2 How to Begin a Non-Liturgical Forensic Examination The System The Manual Hidden How to Correlate the Works Chapter 3 The Liturgical Forensic Examination Tracing Activity on a Windows-Based Gathering Evidence For Prosecution Gathering Evidence Without Intent to The Microsoft Windows-Based General Guidelines To Bookmarks Internet Explorer s History Temporary Storage on the Hard Temporary Internet System Enabling and Using Auditing via the Windows Operating .