Software Forensics

Overview

Follow the trail. Catch the perp.From one of the world's foremost investigators of computer viruses comes this comprehensive tutorial on solving cyber crimes and bringing perpetrators to justice. Author Robert M. Slade's Software Forensics provides expert instruction in tracking and identifying cybercriminals. A professional security consultant to Fortune 500 companies since 1987, Rob Slade teaches you the tools and methods he uses to find the invisible "DNA" on malicious computer code. The Only Comprehensive ...
See more details below
Paperback
$41.15
BN.com price
(Save 6%)$43.95 List Price
Other sellers (Paperback)
  • All (8) from $36.99   
  • New (6) from $40.63   
  • Used (2) from $36.99   
Sending request ...

Overview

Follow the trail. Catch the perp.From one of the world's foremost investigators of computer viruses comes this comprehensive tutorial on solving cyber crimes and bringing perpetrators to justice. Author Robert M. Slade's Software Forensics provides expert instruction in tracking and identifying cybercriminals. A professional security consultant to Fortune 500 companies since 1987, Rob Slade teaches you the tools and methods he uses to find the invisible "DNA" on malicious computer code. The Only Comprehensive Technical Reference on the Tools and Tactics of Cybercrime Investigation and Prosecution There is no better or faster way for programmers, security analysts and consultants, security officers in the enterprise, application developers, lawyers, judges, and anyone else interested in solving cyber crime to get up to speed on forensic programming tools and methods and the nature of cyber evidence. Robert M. Slade's one-of-a-kind Software Forensics shows you how to —

* Learn the technical tools available for identifying and tracking virus creators and other programming miscreants
* Master the techniques and tactics of cyber crime investigation and prosecution
* Analyze source code, machine code, and text strings to track and identify cyber criminals
* Overcome attempts to misdirect investigations into cyber evidence
* Examine eye-opening case studies from real criminal investigations
* Understand enough of the rules of evidence and relevant legal intricacies to make your findings admissible in court
* Learn about the hacker, cracker, and phreak communities
Read More Show Less

Product Details

  • ISBN-13: 9780071428040
  • Publisher: McGraw-Hill Companies, The
  • Publication date: 1/12/2004
  • Pages: 240
  • Product dimensions: 0.51 (w) x 7.50 (h) x 9.25 (d)

Table of Contents

Introduction xi
1 Introduction to Software Forensics 1
Digital Forensic Definitions 2
Software Forensics 4
Objectives and Objects of Software Forensics 5
Identity 6
Other Objects of Study 11
Software Forensic Tools 12
The Process 12
The Products 14
Finally, Already, the Tools 16
Software Forensic Technologies and Practices 18
Content Analysis 18
Noncontent Analysis 19
Legal Considerations 20
Presentation in Court 21
Summary 21
2 The Players--Hackers, Crackers, Phreaks, and Other Doodz 23
Terminology 24
Types of Blackhats 26
Motivations and Rationales 29
General Characteristics 35
Blackhat Products 37
Other Products 42
Summary 43
3 Software Code and Analysis Tools 45
The Programming Process 47
The Products 51
The Resulting Objects 52
The Analytical Tools 53
Forensic Tools 63
Summary 64
4 Advanced Tools 65
Decompilation 65
Desquirr 67
Dcc 68
Boomerang 68
Plagiarism 68
JPlag 69
YAP 70
Other Approaches 71
Summary 76
5 Law and Ethics--Software Forensics in Court 77
Legal Systems 77
Differences within Common Law 78
Jurisdiction 79
Evidence 80
Types of Evidence 80
Rules of Evidence 81
Providing Expert Testimony 84
Ethics 87
Disclosure 88
Blackhat Motivations as a Defense 89
Summary 90
6 Computer Virus and Malware Concepts and Background 91
History of Computer Viruses and Worms 91
Malware Definition and Structure 95
Virus Structure 98
Worm Structure 100
Trojan Structure 101
Logic Bomb Structure 103
Remote Access Trojan (RAT) Structure 103
Distributed Denial of Service (DDoS) Structure 104
Detection and Antidetection Techniques 104
Detection Technologies 106
Stealth and Antidetection Measures 111
Summary 112
7 Programming Cultures and Indicators 113
User Interface 113
Cultural Features and "Help" 116
Functions 120
Programming Style 122
Program Structure 122
Programmer Skill and Objectives 124
Developmental Strictures 126
Technological Change 127
Summary 127
8 Stylistic Analysis and Linguistic Forensics 129
Biblical Criticism 130
Shakespeare and Other Literature 131
Individual Identification and Authentication 134
Content Analysis 137
Noncontent Analysis 139
The Content/Noncontent Debate 144
Noncontent Metrics as Evidence of Authorship 145
Additional Indicators 146
Summary 146
9 Authorship Analysis 147
Problems 147
Plagiarism Detection versus Authorship Analysis 148
How Can It Work? 150
Source Code Indicators 150
More General Indicators 151
Is It Reliable? 152
Summary 153
References and Resources 155
Introduction and Background 156
Blackhats 166
Tools 174
Advanced Tools 190
Law and Ethics 190
Viruses and Malware 196
Stylistic Analysis and Linguistic Forensics 201
Software Authorship Analysis 202
Index 205
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)