Rating: Summary: Important Subject Review: As an IT employee in a major telephone company, I found this book to be a valuable resource. Seeing the threat from a domestic and terrorist perspective was helpful to me. This book gave me some good applications to protect our information. I would recommend this book to anyone who is in the corporate security business as I am. I also enjoyed some the anecdotal stories within the book.
Rating: Summary: Just like a well written thriller Review: At this point I have become a regular reader of just about anything that John Vacca writes. No matter what is the subject, even if quite far from my sphere of knowledge, I find his tratment of the subjects so well researched and written that I always end up enjoying every page. This last effort on computer forensics is a perfect example of what above. Well done again!!!
Rating: Summary: Just like a well written thriller Review: At this point I have become a regular reader of just about anything that John Vacca writes. No matter what is the subject, even if quite far from my sphere of knowledge, I find his tratment of the subjects so well researched and written that I always end up enjoying every page. This last effort on computer forensics is a perfect example of what above. Well done again!!!
Rating: Summary: Sherlock Holmes and Quincy go Hi Tech Review: Being a longtime computer professional over three decades, several countries, and two continents, I have read many of Vacca's books. This is the best yet. Although his target audience is computer forensic experts and training of such (and I have no intent of entering that specialty), I could not put this book down.From do-it-yourself tracking of hacker trails to the frightening sophistication of cyber warfare, he has covered it. His scenarios are instructive and easily applied to our real-life situations, particularly in the logistics of managing breakins and disaster recoveries and in how to properly resolve issues that have often been unfairly dealt with in the past. These scenarios are often amusing as well ("The Case of the Flying Laptop", "A Dog's Breakfast"). After 30 some years of technical work with NASA and major overseas businesses, I must admit to enjoying the occasional chuckle and exclamation point. Again, I am awed by his research and Vacca's ability to post us on the cutting edge of technology. Of course he refers to previous works of his own where applicable - why should he not? His books have often become reference works to me in dealing with technical and managerial issues. But I am even more impressed by his ability to present the technology so readably and clearly. And I emerged with an amplified awareness of how much technology has changed our lifestyles, negatively as well as positively. I would not call this "scare tactics". It is more like "Wake up to reality". This book is not just for technical people. Writers and managers, take note!
Rating: Summary: Another "How to..." disappointment. Review: Computer Forensics: Computer Crime Scene Investigation (With CD-ROM)by John R. Vacca. This book is a real disappointment. It is pedantic, has low technical content, 90% palaver, and lots of anecdotal stories of little practical use. Amazon should be ashamed of recommending it.
Rating: Summary: Protect Yourself From Hackers Review: Computer hackers and criminals cause billions of dollars of losses to business, government and individuals each year. This comprehensive text provides insight into the how and why of hacking, how to recover lost data and how to find evidence of computer crime. Especially useful are case studies of actual computer crimes as well as web addresses pertaining to computer forensics and law enforcement. In addition, the CD includes demos of the lastest computer forensics software. With virtually all proprietary data accessible by computer, Computer Forensics by Vacca is a must read for any corporate or government security professional or anyone wanting to learn about this fast growing field.
Rating: Summary: Computer forensics training Review: Cyber crime is growing at a phenomenal rate. According to a recent survey, 91% of respondents had detected cyberattacks on their company, and 384 responding organizations suffered $376,690,051 in financial losses! Those trained in computer forensics can help, and this book provides an invaluable aid to such training. Geared to professionals in computer forensics, security, and law enforcement, it explains how to analyze and conduct a computer forensics exam and report the findings, leading to jailtime for the attackers. For companies, the book provides the fundamental knowledge needed to analyze system risks, and implement a workable security and forensics policy that protects info assets from potential intrusion, damage or theft.
Rating: Summary: Excellent Information Technology Resource Review: If you are an Information Technology specialist and are looking for a new field of endeavor, then Computer Forensics may be it. This book is full of methods and techniques that can be utilized as a foundation for a new career. Security (detection, protection, eradication) verses evil (corruption, theft, terrorism) is the name of the game when it comes to cyberspace. Computer Forensics covers it all. It is interesting, stimulating, and some times frightening, yet it's educational, and even provides a glimpse into the future. Mr. Vacca gained first hand experience as a computer security official at NASA, and has skillfully applied his knowledge to the subject matter contained in this exciting new book. Thanks John, you really did it this time.
Rating: Summary: Computer Warfare Review: If you want an understanding and insight into computer crimes and information warfare,Vacca's latest book explains, exemplifies and prepares the reader with information and facts on what, when and how the computer crimes will manifest themselves. Computer Forensics is a must buy to educate yourself regarding these activities.
Rating: Summary: Data from the dead? You bet! Review: If you're like me, you don't have a multi-million dollar conglomeration of software to protect... but you *DO* pay money to software houses that do! If you want to know why companies pay such high costs to protect their products, or if you're on the technical side of the fence around the internet, this text is invaluable. Vacca starts the text with an excellent overview (including fundamentals and useful case histories) and continues to probe further into the terroristic world of hacking. From evidence, capture, failure analysis, to counter-measures and information warfare, this book (and the accompanying CD-ROM) is an invaluable addition to the shelf of the computer security specialist. It also provides interesting reading for the "security curious" computer folks (like me) as well.
|