电子取证资料

-
电子取证 Computer Forensics JumpStart, 2nd Edition.pdf
Computer Forensics Jumpstart Second edition Computer Forensics Jumpstart Second edition Michael G. solomon K Rudolph Ed tittel Neil broom Diane barrett WILEY wile ey Publishing, inc. Acquisitions Editor: Agatha Kim Development Editor: Stef Jones Technical Editor: Neil Broom Production editor: dassi zeidel Copy Editor: Sara E. Wilson Editorial Manager: Pete gaughan Production Manager: Tim Tate Vice President and Executive group publisher: richard Wadley Vice President and Publisher: Neil edde Book Designer: Judy Fung Compositor: James D. Kramer, Happenstance Type-O-Rama Proofreader: Publication Services. Inc. Indexer: Nancy Guenther Project Coordinator, Cover: Katherine Crocker Cover Designer: Ryan Sneed Cover Image: O Tetra Images/ Getty Images Copyright o 2011 by Wiley Publishing, Inc, Indianapolis, Indiana Published simultaneously in Canada ISBN:978-0-470-93166-0 ISBN:978-1-118-06757-4(ebk ISBN:978-1-118-06765-9(ebk ISBN:978-1-118-06764-2(ebk No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through pay ment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA01923,(978)750-8400, fax(978)646-8600 Requests te the Publisher for permission should be addressed to the Permissions Department, John Wiley Sons, Inc, 111 River Street, Hoboken Nj07030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissions Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warran- ties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U. S at(877)762-2974, outside the U.S. at(317)572-3993 or fax(317)572-4002 Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books Library of Congress Cataloging-in-Publication Data is available from the publisher TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley Sons, Inc and/ or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc, is not associated with any product or vendor mentioned in this book 10987654321 Dear reader Thank you for choosing Computer Forensics Jump Start, Second Edition. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practical experi ence with a gift for teaching Sybex was founded in 1976. More than 30 years later, we're still committed to producing consistently excep tional books. With each of our titles, were working hard to set a new standard for the industry. From the paper we print on, to the authors we work with, our goal is to bring you the best books available I hope you see all that reflected in these pages. I'd be very interested to hear your comments and get your feedback on how we're doing Feel free to let me know what you think about this or any other Sybex book by sendingmeanemailatnedd@wiley.com.Ifyouthinkyou'vefoundatechnicalerrorinthisbook,pleasevisit http://sybex.custhelp.comCustomerfeedbackiscriticaltooureffortsatSybex Best regards Neil edde Vice president and publish Sybex, an Imprint of wiley To begin with, id like to welcome Mary kyle to our merry band, and to thank her for bull- dogging this project in fine fashion thanks also to Kim Lindros, agatha Kim, Jeff kellum, and the rest of the Sybex/Wiley gang. Dearer to my heart, I'd like to thank my lovely wife Dina, and my son, Gregory, for once again putting up with the old man when he's in the throes of creating and finishing another book. You two make everything else worthwhile, and I'm really looking forward to a fun, frenetic, and distraction- free holiday season. Best to one and all, and thanks to our readers who provide the justification for all this learning and hard work. May it do much good, and very little harm Ed Tittel To God, who has richly blessed me in so many ways, and to my wife and best friend, Stacey Michael. solomon To Richard Kane K Rudolph To my mother, you gave me everything. I love you. Neil B Acknowledgments The authors of this book are a sizable and rowdy crowd, including Michael g. Solomon, Diane Barrett, K Rudolph, Neil Broom, and Ed Tittel. We'll start off by thanking each other for hanging together, rather than Kyle Inks and Kim Lindros, both of whom help herd the rest of us cats across the finish line. To our Waterside ar separately, in compiling this second edition. Next, we'd like to thank our able and capable project managers, Mary agent, Carole Jelen, who help put the deal together and shot trouble whenever and wherever she saw it Thanks and keep up the good work! After that, it's time for the folks at Sybex/Wiley to take a bow and accept our thanks too: Agatha Kim, our intrepid acquisitions editor; Stef Jones, our masterful development editor; Jenni Housh, our editorial assistant and Jill of all processes and procedures; Dassi Zeidel, our amazing production editor; as well as Pete Gaughan, our dazzling editorial manager. We're sure there are plenty of others we would be thanking, if onl we knew their names and roles. Please accept this shout out, in lieu of something more personal and informed Believe it or not, we are quite grateful! And finally, to all the vendors who contributed software, hardware, and even the rights to reproduce screenshots or photographs: Thanks for creating the technologies that helped to make this book possible, and we hope also, its contents useful. We literally could not have done it without you Ed Tittel Thanks to the wonderful team that made this a fun and productive project. Mary did an outstanding job of man- aging the flow of tons of content and materials, as well as managing the authors and editors. Our technical edi- tor, Neil, made all of our work better through his insightful comments and suggestions. And finally, ed and K are both outstanding authors who make it all look easy I'd love to work with this team again olomon This book would not have been possible without the support of Mary Kyle, Michael G. Solomon, Ed Titte Neil Broom, John B Ippolito, Sam Carter, and Richard Kane. I am deeply grateful for their fantastic sugges tions and unbelievable patience. I am fortunate and happy to be surrounded by such great people K Rudolph Thank you to my aunt, Jeanne Starnes, for your great advice, help, and love throughout the years. Special thanks to Gary Harbin for showing me how to build my first computer--look what you started. Bryan Bain, Lee Ann Bain, David Klukowski, Kenny Wilkins, and Doug Moore, you all made my first IT job great. Thank you for helping me get started in the field Thanks to Brad Reninger and Will Dean for working so hard every day to make trc sue cessful. Your professionalism, dedication, and friendship are what make the company great. It is always a pleasure to work with legal professionals as dedicated as Jennifer Georges, Brian Saulnier, Hank Fellows, and Christine tenley Shauna Waters, thank you for always being upbeat and for teaching me how to sell. Thanks to the wonderful people at Intelligent Computer Solutions, especially Ezra Kohavi, Gonen Ravid, San Casas, Karen Benzakein, and viviana Meneses, who help me stay on the cutting edge of new technology in this ever-changing field. Thank you, Amber Schroader and Shannon Honea at Paraben, for all the support. And finally, thank you to Ted Augustine and Chris Brown at Technology Pathways. Chris, you have been a great friend and a wonderful mentor 一 Neil broom About the authors Ed Tittel is a 28-year veteran of the IT industry. After spending his first seven years writing code (mostly for data- base engines and applications), he switched to a networking focus. After working for Excelan/Novell from 1987to 1994. he became a full-time freelance writer, consultant and trainer. He has contributed to more than 100 books on a variety of subjects, including the Sybex Cissp Study guide, fifth Edition, and many For dummies titles. He also blogs regularly for TechTarget. com, and writes for a variety of IT certification-oriented Web sites Michael G. Solomon, CISSP, PMP, CISM, GSEC, is a full-time security speaker, consultant, and author special izing in achieving and maintaining secure IT environments. An It professional and consultant since 1987, he has worked on projects for more than 100 major organizations and authored and contributed to numer ous books and training courses. From 1998 to 2001, he was an instructor in the Kennesaw State University's Computer Science and Information Sciences(CSIS)department, where he taught courses on software project management, C++ programming, computer organization and architecture and data communications. michael holds an M.S. in Mathematics and Computer Science from Emory University (1998), a B.S. in Computer Science rom Kennesaw State University (1987), and is currently pursuing a Ph. D. in Computer Science and Informatics at Emory University. He has also contributed to various security certification books for LAN Wrights, including TICSA Training Guide(Que, 2002 )and an accompanying Instructor Resource Kit(Que, 2002), CISSP Stud Guide(sybex, 2003), as well as Security+ Training Guide(Que, 2003). Michael coauthored Information Security luminated (ones Bartlett, 2005), Security+ Lab Guide( sybex, 2005), Computer Forensics Jump Start (Sybex, 2005), PMP Exam Cram2(Que, 2005)and authored and provided the on-camera delivery of learnKey's CISSP Prep and PMp Prep e-Learning course K Rudolph is the founder and clo( Chief Inspiration Officer) of Native Intelligence, Inc. She is a Certified Information Systems Security Professional (CiSSP)with a degree from Johns Hopkins University. K creates entertaining educational materials that have been presented to more than 400,000 learners and translated into five languages. She has contributed to eight books on security topics including the handbook of information Security, Computer Security Handbook, System Forensics, Investigation, and Response, and NIST Special Publication 800-16, Information Technology security Training Requirements: A Role- and Performance-Based Model k has presented at numerous conferences, including the Computer Security Institute Security Exchange (CSI SX)Conference, CSI Annual Security Conferences, New York Cyber Security Conferences, and Information Assurance and Security Conferences held by the Fissea, Flac, and egov. she has been a speaker for Security Awareness Day events held by the Army, Census Bureau, DLA, IHS, IRS, NOAA, NRC, and the government of Johnson County, Kansas. K volunteers with(ISC)2's Safe and Secure Online program, which b rings awareness presentations for 11-to 14-year-olds to local schools. In March 2006, the Federal Information Systems Security Educators'Association(FISSEA) honored K as the Security Educator of the Year. K is interested in just about everything, including contact juggling, mind mapping, storytelling, core work, aviation, teaching analogies, and photogra

2.94MB
WinHex取证资料详解
2011-02-13Windows版的数据恢复软件中,X-Ways Forensics已经广为应用。我们经常把它称之为WinHex,不过也没有错,它们是德国X-Ways公司的姊妹产品,适用面稍有区别。X-Ways For
164KB
电子测量中的高清视频检测车辆违章取证系统
2020-10-21非现场交通执法模式与传统执法模式的最大区别在于违法/违章一旦发生即可以形成视觉资料记录在案,行为人并不是在违法现场马上得知自己已被记录,而是在视觉资料经审查无误成为行政处罚证据后才按程序接受调查,并接
107KB
电脑病毒资料史
2019-04-07电脑病毒是电脑犯罪的一种新的衍化形式。电脑病毒是高技术犯罪,具有瞬时性、动态性和随机性,且不易取证,从而刺激了犯罪意识和犯罪活动。这是某些人恶作剧和报复心态在电脑应用领域的表现。 电脑软硬
673KB
计算机仿真
2018-04-24计算机进行仿真计算机仿真是应用电子计算机对系统的结构、功能和行为以及参与系统控制的人的思维过程和行为进行动态性比较逼真的模仿。它是一种描述性技术,是一种定量分析方法。通过建立某一过程或某一系统的模式,
51.18MB
现代密码学 电子教程
2014-02-13现代密码学电子教程,知识详细丰富,适合初学者,可以作为科研人员,学生的参考资料。
49.0MB
数据重现:文件系统原理精解与数据恢复最佳实践 (4-2) 带标签清晰版
2013-01-14本书不仅对常见的DOS分区体系及Windows的FAT文件系统、NTFS文件系统进行了详细的介绍,更涵盖了苹果机分区、BSD分区、SPRC平台的Sun Solaris分区、GPT分区等分区方式,以及L
23.46MB
Netking网络监控系统 v20130901.zip
2019-07-17Netking网络监控系统只需要通过一台电脑即可监控整个公司员工的网络活动。和传统监控程序相比,不需要在每台电脑客户端安装软件即可监控,省去很多麻烦,最新版本首次独家实现:不在客户端安装,就可以监控单
4KB
基于会计电算化的审计问题与对策.txt
2011-03-26给予会计电算化的审计问题与对策 【摘 要】电算化会计信息系统和手工会计信息系统相比,有其自身的特点,使审计工作面临着严峻的挑战,也给审计工作带来了深远的影响和更高的要求。本文分析电算化审计当前存在的问
33.42MB
iSee视频监控 v5.2
2013-02-20iSee视频监控 v5.2 视频监控软件使用说明书 版权所有 翻录必究 2009年10月1日 Ver:01.01.05 注意事项 首先,感谢您选用我公司最新产品。 在使用本监控卡之前,请详细阅读本说明
高并发下的Nginx性能优化实战
2019-12-24【超实用课程内容】 本课程内容包含讲解解读Nginx的基础知识,解读Nginx的核心知识、带领学员进行高并发环境下的Nginx性能优化实战,让学生能够快速将所学融合到企业应用中。 【课程如何观看?】 PC端:https://edu.csdn.net/course/detail/27216 移动端:CSDN 学院APP(注意不是CSDN APP哦) 本课程为录播课,课程永久有效观看时长,大家可以抓紧时间学习后一起讨论哦~ 【学员专享增值服务】 源码开放 课件、课程案例代码完全开放给你,你可以根据所学知识,自行修改、优化 下载方式:电脑登录https://edu.csdn.net/course/detail/27216,播放页面右侧点击课件进行资料打包下载
python入门
2018-12-18您观看课程学习后 免费入群领取【超全Python资料包+17本学习电子书】 帮助与数百万年轻人打开人工智能的学习大门!
Python进阶-Pandas数据分析库
2018-12-18您观看课程学习后 免费入群领取【超全Python资料包+17本学习电子书】 Pandas是python中非常常用的数据分析库,在数据分析,机器学习,深度学习等领域经常被使用。本课程会讲解到pandas中最核心的一些知识点,包括Series以及DataFrame的构建,赋值,操作,选择数据,合并等等,以及使用pandas对文件进行读取和写入,使用pandas绘图等等。
JAVA入门精品课程
2018-12-20课程目标: 1、让初学者从小白开始,善于运用知识点,解脱学习的苦恼 2、能够学习更多的工作中使用技巧,成为编程高手
Java系列技术之JavaWeb入门
2018-09-18JavaWeb里的基础核心技术
535KB
2021年数据建模美赛必备LATEX模板
2018-01-272021数模美赛LATEX模板,美赛必备,CTeX,Texlive都可以用~~~~~年份可以任意修改
C/C++程序员实战基础
2019-08-20大数据的入门视频教程
2018-07-26大数据技术入门视频课程,会从基础思想和原理架构开始,全面介绍大数据的思想体系和架构,为学员进一步学习大数据奠定良好的基础。内容涉及大数据的核心问题、大数据核心思想,Google的三篇论文、GFS,Google的分布式文件系统,MapReduce,BigTable、Hadoop和Spark生态体系以及具体应用演示。
2020华为HCIA/HCNA/数通/路由交换/实验/视频/教程/持续更新赠题库
2020-05-25本课程不仅可以帮助大家顺利考取华为HCIA证书,同时技术视频均为理论+实战配套讲解,讲解细致,通俗易懂,资料完整,可以让大家学到实实在在企业用到的网络技术,本课程包含完整的学习资料,视频+PPT课件,能够帮助你快速掌握HCIA数通网络技术,同时视频中3-4视频后面的附件课件包含了HCIA数通考试题库(带答案),适合从零基础学网络考HCIA的同学!
高性能MySQL实战课
2020-05-21限时福利1:原价 129 元,最后2天仅需 69 元!后天涨价至98元 限时福利2:购课进答疑群专享柳峰(刘运强)老师答疑服务 限时福利3:购课添加助教领取价值 800 元的编程大礼包 为什么需要掌握高性能的MySQL实战? 由于互联网产品用户量大、高并发请求场景多,因此对MySQL的性能、可用性、扩展性都提出了很高的要求。使用MySQL解决大量数据以及高并发请求已经是程序员的必备技能,也是衡量一个程序员能力和薪资的标准之一。 为了让大家快速系统了解高性能MySQL核心知识全貌,我为你总结了「高性能 MySQL 知识框架图」,帮你梳理学习重点,建议收藏! 【课程设计】 课程分为四大篇章,将为你建立完整的 MySQL 知识体系,同时将重点讲解 MySQL 底层运行原理、数据库的性能调优、高并发、海量业务处理、面试解析等。 一、性能优化篇: 主要包括经典 MySQL 问题剖析、索引底层原理和事务与锁机制。通过深入理解 MySQL 的索引结构 B+Tree ,学员能够从根本上弄懂为什么有些 SQL 走索引、有些不走索引,从而彻底掌握索引的使用和优化技巧,能够避开很多实战中遇到的“坑”。 二、MySQL 8.0新特性篇: 主要包括窗口函数和通用表表达式。企业中的许多报表统计需求,如果不采用窗口函数,用普通的 SQL 语句是很难实现的。 三、高性能架构篇: 主要包括主从复制和读写分离。在企业的生产环境中,很少采用单台MySQL节点的情况,因为一旦单个节点发生故障,整个系统都不可用,后果往往不堪设想,因此掌握高可用架构的实现是非常有必要的。 四、面试篇: 程序员获得工作的第一步,就是高效的准备面试,面试篇主要从知识点回顾总结的角度出发,结合程序员面试高频MySQL问题精讲精练,帮助程序员吊打面试官,获得心仪的工作机会。
342.37MB
2020美赛C题资料.zip
2020-05-14关于2020年数模美赛c题的,题目,数据,文献资料,一些代码,以及思路和感想。其中在感想部分谈及了C题两种解答方法的对比(评论处理方法,另一种是我们老师带的另外几队拿了H奖的)。我们对这次论文交的比较
反编译Android应用
2015-01-26学习技术的渠道多种多样,而通过反编译一些经典应用来学习是一种比较好的途径,在Android领域,有比较好的反编译工具,本课程将会教大家如何反编译Android应用。
程序员的数学:微积分
2019-09-28本课程介绍程序员必备的数学基础内容,在取材上侧重人工智能、数据分析等热门领域
微信小程序样式开发入门
2019-01-07讲解微信小程序中样式的入门使用,如何使用传统的css知识点来开发wxss的样式;本节课主要讲解在微信小程序中创建样式的几种 写法,元素选择器的基础使用,id选择器和id派生选择器的使用,class类选择器的使用。
8小时Python零基础轻松入门
2020-05-20
- CSDN 2020 博客之星实时数据排名(Python 爬虫 + PyEcharts) 31042021-01-12CSDN 2020 博客之星实时数据排名:csdn.itrhx.com CSDN 一年一度的博客之星评选开始了,官网地址:https://bss.csdn.net/m/topic/blog_star2020 ,由于官网是按照随机编号排序的,没有按照票数多少排序,为了方便查看排名,可以使用 Python 爬虫 + PyEcharts 来实现实时数据排名。 打开 Google Chrome 的审查工具,可以找到一个 getUsers 的请求,请求地址为:https://bss.csdn.net/m/topic
Java并发编程精讲
2019-09-28课程会讲解Java中并发相关技术的基础、原理和应用,从线程安全、线程(池), 锁实现和并发容器等高并发Java实现,去深入理解在并发编程中, 一些最容易被忽视的点,这些点也是我在多年编程经验中实际用到, 对于每个小节小课均会有实际的场景应用为你呈现。 同时这些也是面试过程中面试官考察的重点,掌握这些点,面试和工作时,做到心中有货,不慌不乱,能够胜任。
-
下载
cuda10.0和cudnn10.0
cuda10.0和cudnn10.0
-
下载
小论文数据求解.zip
小论文数据求解.zip
-
下载
ACM计划(针对大一).pdf
ACM计划(针对大一).pdf
-
下载
TimeTable.zip
TimeTable.zip
-
博客
215. 数组中的第K个最大元素 ( 基于快排的选择算法 )
215. 数组中的第K个最大元素 ( 基于快排的选择算法 )
-
博客
C++学习(一八九)JNI与NDK关系
C++学习(一八九)JNI与NDK关系
-
博客
LeetCode - Easy - 242. Valid Anagram
LeetCode - Easy - 242. Valid Anagram
-
博客
mac系统渗透测试小技巧-将命令行工具能够tab补全
mac系统渗透测试小技巧-将命令行工具能够tab补全
-
学院
ProBuilder快速原型开发技术
ProBuilder快速原型开发技术
-
下载
CCED2000的使用技巧.rar
CCED2000的使用技巧.rar
-
学院
【数据分析-随到随学】Spark理论及实战
【数据分析-随到随学】Spark理论及实战
-
博客
CentOS7_64 位操作系统模板搭建
CentOS7_64 位操作系统模板搭建
-
博客
简单的学生在线练习系统(PHP版)
简单的学生在线练习系统(PHP版)
-
学院
彻底学会正则表达式
彻底学会正则表达式
-
学院
基于X210的裸机时钟温度显示器-第3/3季
基于X210的裸机时钟温度显示器-第3/3季
-
下载
DOS94-01.EXE
DOS94-01.EXE
-
博客
jquery的插件有哪些
jquery的插件有哪些
-
博客
Arrays分类算法-Spiral Traverse(待完成)
Arrays分类算法-Spiral Traverse(待完成)
-
下载
webots_ros2.zip
webots_ros2.zip
-
学院
转行做IT-第6章 IDEA、方法
转行做IT-第6章 IDEA、方法
-
下载
DEV C++安装-2021.01.17.pdf
DEV C++安装-2021.01.17.pdf
-
下载
Driver Signature Enforcement Overrider-桌面系统工具类资源
Driver Signature Enforcement Overrider-桌面系统工具类资源
-
博客
linux 软硬链接详解,下附原地址
linux 软硬链接详解,下附原地址
-
学院
30个生涯锦囊,带你跳出迷茫,找到适合你的职业方向
30个生涯锦囊,带你跳出迷茫,找到适合你的职业方向
-
下载
2020牛客多校暑期集训营第一场题解.pdf
2020牛客多校暑期集训营第一场题解.pdf
-
学院
智联万物,京东IoT技术创新与实践
智联万物,京东IoT技术创新与实践
-
下载
2021年408考试真题 下载 PDF打印
2021年408考试真题 下载 PDF打印
-
学院
python数据分析基础
python数据分析基础
-
学院
性能测试面面观
性能测试面面观
-
博客
向量算子优化Vector Operation Optimization
向量算子优化Vector Operation Optimization