Clica una miniatura per anar a Google Books.
S'està carregant… Internet Forensicsde Robert Jones
Cap S'està carregant…
Apunta't a LibraryThing per saber si aquest llibre et pot agradar. No hi ha cap discussió a Converses sobre aquesta obra. My standard nonfiction book rating is 3 stars but I'm tempted to go higher for this book because I learned to play Sherlock Holmes on the internet. This book taught me the basics of how spammers and scammers operate and where to look for their telltale fingerprints and other clues.It goes beyond the simple consumer warnings and advice but not as far as corporate systems auditing. It assumes you take the usual precautions of antivirus, spyware, and firewall software and takes you into the realm of amateur detective. A hobbyist programmer or power user can understand the concepts and with some knowledge of Unix type commands and scripting languages can follow the explanations in detail.This edition is from Oct 2005 so I'm sure the really clever ploys have become far more sophisticated. To use another dreaded car analogy, this book is not about finding the professional car theft ring but about tracking the joy riding teenager. The author even cautions about taking your investigations to the extreme of interfering with ongoing law enforcement efforts. The internet is an open environment and there are tracks, traces, logs, and other information waiting to be found. You learn how to filter and interpret email and other communication headers, web page directories and source code, server logs and redirects, and other interesting detritus.Being an old mainframe programmer I used to enjoy poring over hexadecimal dumps looking for bugs. Now I can recapture some of that by examining the internet trails. ( ) My standard nonfiction book rating is 3 stars but I'm tempted to go higher for this book because I learned to play Sherlock Holmes on the internet. This book taught me the basics of how spammers and scammers operate and where to look for their telltale fingerprints and other clues.It goes beyond the simple consumer warnings and advice but not as far as corporate systems auditing. It assumes you take the usual precautions of antivirus, spyware, and firewall software and takes you into the realm of amateur detective. A hobbyist programmer or power user can understand the concepts and with some knowledge of Unix type commands and scripting languages can follow the explanations in detail.This edition is from Oct 2005 so I'm sure the really clever ploys have become far more sophisticated. To use another dreaded car analogy, this book is not about finding the professional car theft ring but about tracking the joy riding teenager. The author even cautions about taking your investigations to the extreme of interfering with ongoing law enforcement efforts. The internet is an open environment and there are tracks, traces, logs, and other information waiting to be found. You learn how to filter and interpret email and other communication headers, web page directories and source code, server logs and redirects, and other interesting detritus.Being an old mainframe programmer I used to enjoy poring over hexadecimal dumps looking for bugs. Now I can recapture some of that by examining the internet trails. Sense ressenyes | afegeix-hi una ressenya
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it. This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at th No s'han trobat descripcions de biblioteca. |
Debats actualsCap
Google Books — S'està carregant… GèneresClassificació Decimal de Dewey (DDC)005.8Information Computing and Information Computer programming, programs, data, security Computer SecurityLCC (Clas. Bibl. Congrés EUA)ValoracióMitjana:
Ets tu?Fes-te Autor del LibraryThing. O'Reilly MediaUna edició d'aquest llibre ha estat publicada per O'Reilly Media. |