Introduction As an auditor as well as researcher and author, I realize and value the importance of timely, well−focused, accurate information. It is with this philosophy in mind that the development of this project was undertaken. To the reader, a note of explanation…. This is not a text, but rather a field manual. It has been written — better yet, compiled — and edited in a manner that will allow you to rapidly access a specific area of interest or concern and not be forced to sequentially wade through an entire text, chapter by chapter, to get to what is important to you. In the true sense of a field manual, each "chapter" (and we use that term loosely) stands on its own and presents focused, timely information on a specific topic related to cyber forensics. The author of each "chapter" was selected for his or her expertise in a specific area within the very broad field of cyber forensics. Often a limiting aspect of most projects, especially those written on emerging technical topics, is the inability to cover every aspect of the topic in a single all−inclusive text. This truth befalls this field manual that you are about to use. Initial research into this growing discipline proved that it would be next to impossible to include all the areas of both interest and importance in the field of cyber forensics that would be needed and required by all potential readers and users in a single text. Thus, this field manual presents specific and selected topics in the discipline of cyber forensics, and addresses critical issues facing the reader who is engaged in or who soon will be (and you will!) engaged in the preservation, identification, extraction, and documentation of computer evidence. As a user of this field manual, you will see that this manual's strength lies with the inclusion of an exhaustive set of chapters covering a broad variety of forensic subjects. Each chapter was thoroughly investigated; examined for accuracy, completeness, and appropriateness to the study of cyber forensics; reviewed by peers; and then compiled in a comprehensive, concise format to present critical topics of interest to professionals working in the growing field of cyber forensics. We finally had to select several key areas and put pen to paper, entice several colleagues to share their ideas, and resign ourselves to the fact that we cannot say all that needs to be said in one text, book, or manual. We trust the material we have included will serve as a starting point for the many professionals who are beginning their journey into this exciting discipline. We begin our journey into the realm of this relatively new discipline by opening with a brief discussion as to the current state of the environment relating to the need for this new field of forensics and then a brief examination of the origins of cyber forensics. Along the way, we will establish several basic definitions designed to assist the reader in moving easily through what could be difficult and confusing terrain. Although e−mail is becoming more mission−critical for enterprises, it also has the ability to haunt a company in times of trouble, because records of e−mail messages remain in the company systems after deletion — a feature highlighted during the Microsoft anti−trust trial. The case has featured critical testimony derived from old Microsoft e−mail messages.






























- 1


- 粉丝: 176
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 计算机网络的发展史及现状.doc
- 采购清单Excel模板.xlsx
- 2020年电子商务专业学生实习报告范文.doc
- 逻辑数据库设计--外文翻译.doc
- 吉林大学编译原理课程设计之编译器实现内容
- CorelDRAW教学大纲.doc
- 2020年上半年教育信息化工作总结.doc
- 大二数据结构课程设计之数独游戏开发与实践
- 景观专业网站大全景观设计中的常用英语.doc
- 基于PLC的自动灌溉控制系统设计--本科毕业设计.doc
- 示范课程网站与微课学习平台的设计方案与实现-微课优秀论文.doc
- 网络设备管理与实训-计算机网络基础知识完整.pptx
- 算法初步同步检测6.doc
- 电子商务中商标侵权行为研究电商论文.doc
- 联想网络同传系统应用用户手册.doc
- 网络共享显示计算机无法访问您可能没有权限使用网络资源请咨询管理员的解决方法.pptx


