Access "Secure Reads: Real Digital Forensics"
This article is part of the February 2006 issue of Best-of-breed: Security Products of the Year: 2006
Real Digital Forensics By Keith J. Jones, Richard Bejtlich, Curtis W. Rose Addison-Wesley, 650 pages, $49.99 @exb Real Digital Forensics @exe If you watch even a little television, you know that forensics is a hip, sexy field. But, real digital forensic investigations are neither hip nor sexy, but rather complicated and demanding: There is absolutely no substitute for experience, but it's difficult to come by. Enter Real Digital Forensics, a fantastic book/DVD combo that's shows you how to investigate a set of real-world cases under the guidance of its experienced authors. Real Digital Forensics' hands-on focus makes it stand out. With five cases illustrating forensics techniques, the authors lead you through the investigative process, asking questions and then applying forensic processes to provide the answers. In addition to commercial products like EnCase and FTK, they also highlight many open-source tools such as libPST for e-mail recovery. The DVD includes copies of case data and most of the free software so readers can follow along. Digital ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
-
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
-
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
-
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
-
Game Over?
Where do you turn when the security vendor you've banked on gets gobbled up?
-
Stopping the Next Heist
-
-
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
-
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
-
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
-
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
-
Products of the Year 2006
-
Columns
-
On The Radar: Avoiding security upgrade disaster
Upgrade Agony
-
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
-
Ping: Yan Noblot
Yan Noblot
-
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
-
On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO