EXTREMEZONE FORUM
WWW.EXTREMEZONE.3XFORUM.RO - WWW.TORENTZ.3XFORUM.RO- WWW.PETARDEARTIFICII.CABANOVA.COM http://www.facebook.com/petardeartificiidevanzare
Lista Forumurilor Pe Tematici
EXTREMEZONE FORUM | Reguli | Inregistrare | Login

POZE EXTREMEZONE FORUM

Nu sunteti logat.
Nou pe simpatie:
AlexandraPopa la Simpatie.ro
Femeie
25 ani
Bucuresti
cauta Barbat
25 - 39 ani
EXTREMEZONE FORUM / E-BOOKS FREE DOWNLOAD / Cyber Crime Investigator  
Autor
Mesaj Pagini: 1
SIGISMUNT
☻ADM!N☻

Din: WTF & SoB
Inregistrat: acum 16 ani
Postari: 5916


360 pages | November 28, 2001 | PDF | 1.55 Mb


Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace.Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as:oQuestions to ask the clientoSteps to follow when you arrive at the client's siteoProcedures for collecting evidenceoDetails on how to use various evidence collection and analysis toolsoHow to recover lost passwords or documents that are password protectedoCommonly asked questions with appropriate answersoRecommended reference materialsoA case study to see the computer forensic tools in actionoCommonly used UNIX/Linux commandsoPort number references for various services and applicationsoComputer forensic software tools commands synopsisoAttack signaturesoCisco PIX firewall commandsWe now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does. Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime…tools that tell you the who, where, what, when, why, and how.

Code:

http://rapidshare.com/files/111664207/Cgator_s_Field_W_.rar

Password: DADA 


_______________________________________
PASSWORD ► REMEMBER TO SAY "THX" AND REPORT DEAD LINKS ►



pus acum 16 ani
   
Pagini: 1  

Mergi la