Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and
are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting
them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer
security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such
as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus
software. Hackers have proven their dedication and ability to systematically penetrate networks all over the
world. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system,
steal everything of value, and completely erase their tracks in less than 20 minutes!
The EC-Council Press is dedicated to stopping hackers in their tracks.
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. The first book in the Computer Forensics series is Investigation Procedures and Response. Coverage includes a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators.