Cliquer sur une vignette pour aller sur Google Books.
Chargement... Internet Forensicspar Robert Jones
Aucun Chargement...
Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre Actuellement, il n'y a pas de discussions au sujet de ce livre. My standard nonfiction book rating is 3 stars but I'm tempted to go higher for this book because I learned to play Sherlock Holmes on the internet. This book taught me the basics of how spammers and scammers operate and where to look for their telltale fingerprints and other clues.It goes beyond the simple consumer warnings and advice but not as far as corporate systems auditing. It assumes you take the usual precautions of antivirus, spyware, and firewall software and takes you into the realm of amateur detective. A hobbyist programmer or power user can understand the concepts and with some knowledge of Unix type commands and scripting languages can follow the explanations in detail.This edition is from Oct 2005 so I'm sure the really clever ploys have become far more sophisticated. To use another dreaded car analogy, this book is not about finding the professional car theft ring but about tracking the joy riding teenager. The author even cautions about taking your investigations to the extreme of interfering with ongoing law enforcement efforts. The internet is an open environment and there are tracks, traces, logs, and other information waiting to be found. You learn how to filter and interpret email and other communication headers, web page directories and source code, server logs and redirects, and other interesting detritus.Being an old mainframe programmer I used to enjoy poring over hexadecimal dumps looking for bugs. Now I can recapture some of that by examining the internet trails. ( ) My standard nonfiction book rating is 3 stars but I'm tempted to go higher for this book because I learned to play Sherlock Holmes on the internet. This book taught me the basics of how spammers and scammers operate and where to look for their telltale fingerprints and other clues.It goes beyond the simple consumer warnings and advice but not as far as corporate systems auditing. It assumes you take the usual precautions of antivirus, spyware, and firewall software and takes you into the realm of amateur detective. A hobbyist programmer or power user can understand the concepts and with some knowledge of Unix type commands and scripting languages can follow the explanations in detail.This edition is from Oct 2005 so I'm sure the really clever ploys have become far more sophisticated. To use another dreaded car analogy, this book is not about finding the professional car theft ring but about tracking the joy riding teenager. The author even cautions about taking your investigations to the extreme of interfering with ongoing law enforcement efforts. The internet is an open environment and there are tracks, traces, logs, and other information waiting to be found. You learn how to filter and interpret email and other communication headers, web page directories and source code, server logs and redirects, and other interesting detritus.Being an old mainframe programmer I used to enjoy poring over hexadecimal dumps looking for bugs. Now I can recapture some of that by examining the internet trails. aucune critique | ajouter une critique
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it. This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at th Aucune description trouvée dans une bibliothèque |
Discussion en coursAucun
Google Books — Chargement... GenresClassification décimale de Melvil (CDD)005.8Information Computer Science; Knowledge and Systems Computer programming, programs, data, security Computer SecurityClassification de la Bibliothèque du CongrèsÉvaluationMoyenne:
Est-ce vous ?Devenez un(e) auteur LibraryThing. |