Skip to Main Content
Cyber Forensics, 2nd Edition
book

Cyber Forensics, 2nd Edition

by Albert Marcella Jr., Doug Menendez
December 2010
Intermediate to advanced content levelIntermediate to advanced
528 pages
18h 51m
English
Auerbach Publications
Content preview from Cyber Forensics, 2nd Edition
Software: Operating Systems, Network Traffi c, and Applications 163
network security devices. In these cases, investigators should identify other likely data
sources and examine them for evidence.
Insuffi cient or Invalidated Data on Primary Sources—Investigators might need to examine
secondary data sources if primary data sources do not contain suffi cient information or
cyber forensic investigators need to validate the data. After reviewing one or more primary
data sources, cyber forensic investigators should query the appropriate secondary data sources
based on the pertinent data from the primary data sources. For example, if IDS records
indicate an attack against the system at IP address 216.239.51.100 with an apparent origin
of IP addres ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Digital Forensics and Incident Response - Second Edition

Digital Forensics and Incident Response - Second Edition

Gerard Johansen
Digital Forensics

Digital Forensics

John Sammons
Cyber Security and Digital Forensics

Cyber Security and Digital Forensics

Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le

Publisher Resources

ISBN: 9781439848234