Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
|
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) |
List Price: $39.95
Your Price: $25.17 |
|
|
|
Product Info |
Reviews |
Rating: Summary: Data from the dead? You bet! Review: If you're like me, you don't have a multi-million dollar conglomeration of software to protect... but you *DO* pay money to software that do! If you're on the technical side of the fence around the internet, this text is invaluable. Vacca starts the text with an excellent overview (including fundamentals and useful case histories) and continues to probe further into the terroristic world of hacking. From evidence, capture, failure analysis, to counter-measures and information warfare, this book (and the accompanying CD-ROM) is an invaluable addition to the shelf of the computer security specialist. It also provides interesting reading for the "security curious" computer folks (like me) as well.
Rating: Summary: General Review Review: Information obtained from computers has been used in court litigations for at least 25 years. The recent advances in computers along with the widespread use of Intranet and Internet have resulted into a massive movement of information from paper medium to digital format on computer platforms. For this reason, computer forensics is now a more important subject that before. Recent developments such as the events on September 11 and the abuses discovered in the financial behavior of corporations is more proof that computer forensics will become an integral part of criminal investigations. This book has a good description for this important subject as it is today and as it will be in the future.
Rating: Summary: Excellent Information Technology Resource Review: Just like the TV series by the same name this book will keep you riveted to the pages! The sheer volume of technical information that John Vacca covers in his palatable easy to read writing style is truly amazing given the nature of the beast. This book completely covers all aspects of computer crime from how to detect and prevent it to how to make sure that/those person(s) will never commit computer crime again. Without a doubt a must read for anyone concerned with privacy and security issues whether personal, corporate or governmental.
Rating: Summary: Cyber CSI Review: Just like the TV series by the same name this book will keep you riveted to the pages! The sheer volume of technical information that John Vacca covers in his palatable easy to read writing style is truly amazing given the nature of the beast. This book completely covers all aspects of computer crime from how to detect and prevent it to how to make sure that/those person(s) will never commit computer crime again. Without a doubt a must read for anyone concerned with privacy and security issues whether personal, corporate or governmental.
Rating: Summary: Everyone should read this! Review: Not just another over-dressed technical manual, this book is a MUST read for anyone who uses a computer on the Internet. After reading this book, I've implemented security precautions for both my computer at home and the network at work. As an IT consultant, I deal with many, diverse issues, and am frequently called in to deal with issues involved with security. This book has been an invaluable resource, both as a guide to best practices as well as by providing much needed resources and information involving the technical challenge involved in detecting, documenting, and preventing security breaches in the workplace. Sure, it's easy to point and say "yes" the employee did damage or "yes" your system was hacked, but tracing those attacks, documenting them, and taking the appropriate steps to build a successful case has previously been all guesswork. John removes the guesswork with very clear guidelines, real world examples and case studies---binding them to procedures for both isolating and ensuring that existing damage is documented in a manner that won't invalidate the case or violate anyone's rights. But it's not just another technical "manual"---not at all. The writing in Computer Forensics is engaging, captivating, and informative. John brings together the past, the present, and the future of Computer Forensics with a pulse and rhythm of style that is unusual and exiting to find in a book of this genre---it's writing that is concise, well elucidated, and comprehensive reading for anyone.
Rating: Summary: Everyone should read this! Review: Not just another over-dressed technical manual, this book is a MUST read for anyone who uses a computer on the Internet. After reading this book, I've implemented security precautions for both my computer at home and the network at work. As an IT consultant, I deal with many, diverse issues, and am frequently called in to deal with issues involved with security. This book has been an invaluable resource, both as a guide to best practices as well as by providing much needed resources and information involving the technical challenge involved in detecting, documenting, and preventing security breaches in the workplace. Sure, it's easy to point and say "yes" the employee did damage or "yes" your system was hacked, but tracing those attacks, documenting them, and taking the appropriate steps to build a successful case has previously been all guesswork. John removes the guesswork with very clear guidelines, real world examples and case studies---binding them to procedures for both isolating and ensuring that existing damage is documented in a manner that won't invalidate the case or violate anyone's rights. But it's not just another technical "manual"---not at all. The writing in Computer Forensics is engaging, captivating, and informative. John brings together the past, the present, and the future of Computer Forensics with a pulse and rhythm of style that is unusual and exiting to find in a book of this genre---it's writing that is concise, well elucidated, and comprehensive reading for anyone.
Rating: Summary: Very Interesting Read Review: The book offers a comprehensive overview of the subject: from basic definitions and applications (law enforcement and employment checks) to the recovery and capture of forensic evidence. Of particular interest is the discussion of how computer technology has revolutionized the judicial system, from government investigatory techniques to the individual legal discovery process. This discussion is followed by a list of caveats (i.e., now, more than ever, information discovery depends upon the "circumstances of the case and the imagination of the investigator") and an agenda for the appropriate use in discovery of electronic evidence (i.e, never alter the information, back everything up, document information carefully, etc.). The section on terrorism is particularly timely, with its analysis of the October, 2000 USS Cole incident and its sobering conclusions about how easy it is to procure the necessary computer equipment used in attacks. The appendices contain frequently asked questions, more interesting case studies, and a complete glossary of terms. The accompanying CD includes demonstrations of some current forensics software. Altogether a complete guide and a must-read that is destined to become a standard reference work in the field.
Rating: Summary: Destined to become a standard reference work in the field Review: The book offers a comprehensive overview of the subject: from basic definitions and applications (law enforcement and employment checks) to the recovery and capture of forensic evidence. Of particular interest is the discussion of how computer technology has revolutionized the judicial system, from government investigatory techniques to the individual legal discovery process. This discussion is followed by a list of caveats (i.e., now, more than ever, information discovery depends upon the "circumstances of the case and the imagination of the investigator") and an agenda for the appropriate use in discovery of electronic evidence (i.e, never alter the information, back everything up, document information carefully, etc.). The section on terrorism is particularly timely, with its analysis of the October, 2000 USS Cole incident and its sobering conclusions about how easy it is to procure the necessary computer equipment used in attacks. The appendices contain frequently asked questions, more interesting case studies, and a complete glossary of terms. The accompanying CD includes demonstrations of some current forensics software. Altogether a complete guide and a must-read that is destined to become a standard reference work in the field.
Rating: Summary: Huge Disappointment: Little-to-No Technical Content Review: The first 250 or so pages provide a decent (at best) high-level description of Computer Forensics, but the next 300 pages have little to do with computer crime investigations. It seems as if this book should really be two books: the first book would provide a good overview of computer forensics for those who are not very technical, and the second book (larger book) would be on Information Warfare. If you are looking for a decent book on forensic computing, with a lot of technical meat, this is NOT your book.
Rating: Summary: Must read for I/T professionals Review: The reporting of economic and cyber crime continues to be problematic and grossly underestimated. The data reported in this excellent book proves that intellectual property theft and security breaches are sky rocketing. Author John Vacca does it again to produce another outstanding technology book on computer forensics. Deep seated in computer security aspects, this book provides complete coverage of this new sector of computer management and administration. The book's organization is structured to thoroughly cover the basics, evidence manipulation, analysis of data, and a particularly fascinating section on information warfare which provides frightening insight into both domestic and global issues which are here today. Mr. Vacca's extensive background in government and commercial security greatly enhances the readabilitly of this book. A must read for all I/T professionals including CIOs, system administrators, security specialists, and business managers.
|
|
|
|