Demon Dialer Model 27 Uživatelský manuál Strana 7

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 12
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 6
INDEX 151
Reports
and application suites, 55
discovery issues, 61
importance of, 53
photographic documentation, 53, 54
presentation, 57
sections of, 55, 56
uses of, 57
RGB color system, 20, 21
Rivest, Ron, 51
Root-level access, 82
Rootkits, 78, 79, 82, 111, 112, 115
Routing tables, 114, 115
RSA encryption, 49, 51
Running processes, 115
S-Tools, 124
Sabotage, 80
SafeBack, 117
Sanderson Forensics, 123
Scalpel, 122
Scanners as input devices, 15
Scarfo, Nicodemo, 142
Scientific evidence, 131, 132. See also
Expert witnesses
Script kiddies, 69, 70
SCSI disks, 118
Search and seizure, 127, 128
consent, 140, 141
exclusionary rule, 137
Fourth Amendment rights, 137139
legislation, 139142
probable cause, 138
warrants, 138, 139, 141
Search warrants, 31, 32, 109, 138, 139, 141
Searches
authorization, 109, 110
key words, 41
Sectors, 45, 123
Securities fraud, 101105
Security policies and e-mail wiretaps, 81
Serial numbers, hard drive, 118
Service of process, 59, 60
Settlements, 59, 62
Sexual offender databases, 96, 97
Shamir, Adi, 51
Shoulder surfing, 90
Silverstone, Howard, 64
Slack, 30, 34, 35, 42, 43
SnapCopy, 117
Social engineering, 50, 90, 93
Software, installation of and company-issued
laptops, 84
Software, theft of, 83
Software incompatibility, 36
Software piracy, 104
Software write blocker, 33
Spyware, 75, 77, 78, 80
Stand-alone tools, 39, 40, 43
Start-up. See Booting up
Steganalysis, 123
Steganography, 46, 47, 96, 124
Storage
arrays, 36
devices, 15
Symantec Corporation, 43, 80
System components, 116
System information, alteration of, 28, 29,
110, 111
System memory, 114
System scheduling, 115
Systems administrators
and consent under Electronic
Communications Privacy Act, 140,
141
early attitudes toward hackers, 9
user access and permissions, 81, 82, 84
and wireless networks, 73, 74
Table of contents, reports, 55
Technology Pathways, 111, 123
Telephone charges and dial-up modems, 67
Terabytes (TB), 36, 109
Testimony. See also Expert witnesses
as evidence, 129
expert versus lay witnesses, 61
Theft, 84, 85
Time and date stamps, 4143, 115, 122, 124
Time frame analysis, 122
Trade secrets and corporate espionage, 79,
80, 83
Trials
civil, 57, 58, 6265
criminal, 58, 6265
phases of, 57
pretrial phase, 6062
settlements, 59
Zobrazit stránku 6
1 2 3 4 5 6 7 8 9 10 11 12

Komentáře k této Příručce

Žádné komentáře