Computer Science and IT , livre ebook

icon

58

pages

icon

English

icon

Ebooks

2013

Écrit par

Publié par

Lire un extrait
Lire un extrait

Obtenez un accès à la bibliothèque pour le consulter en ligne En savoir plus

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
icon

58

pages

icon

English

icon

Ebook

2013

Lire un extrait
Lire un extrait

Obtenez un accès à la bibliothèque pour le consulter en ligne En savoir plus

When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.
Voir Alternate Text

Date de parution

12 septembre 2013

Nombre de lectures

3

EAN13

9781406268522

Langue

English

Poids de l'ouvrage

12 Mo

A N AT O M Y O F A N I N V E S T I G AT I O N
Computer Science and IT: INVESTIGATINGA CYBER ATTACK
Anne Rooney
Raintree is an imprint of Capstone Global Library Limited, a company incorporated in England and Wales having its registered oîce at 7 Pilgrim Street, London, EC4V 6LB – Registered company number: 6695582
To contact Raintree, please phone 0845 6044371, fax + 44 (0) 1865 312263, or email myorders@ raintreepublishers.co.uk.
Text © Capstone Global Library Limited 2014 First published in hardback in 2014 The moral rights of the proprietor have been asserted.
All rights reserved. No part of this publication may be reproduced in any form or by any means (including photocopying or storing it in any medium by electronic means and whether or not transiently or incidentally to some other use of this publication) without the written permission of the copyright owner, except in accordance with the provisions of the Copyright, Designs, and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency, Saron House, 6–10 Kirby Street, London EC1N 8TS (www.cla.co.uk). Applications for the copyright owner’s written permission should be addressed to the publisher.
Edited by Andrew Farrow, Adam Miller, and Adrian Vigliano Designed by Richard Parker Original illustrations © HL Studios Illustrated by James Stayte (pages 4–7); HL Studios Picture research by Ruth Blair Production by Sophia Argyris Originated by Capstone Global Library Ltd Printed and bound in China by CTPS
ISBN 978 1 406 26102 8 17 16 15 14 13 10 9 8 7 6 5 4 3 2 1
British Library Cataloguing in Publication Data Rooney, Anne Computer science and IT: investigating a cyber attack. – (Anatomy of an investigation)
A full catalogue record for this book is available from the British Library.
AcknowledgementsWe would like to thank the following for permission to reproduce photographs:Alamy pp. 16 (© Ian Shaw), 33 (© Marmaduke St. John), 43 (© Nikita Buida), 46 (© aberCPC); Corbis pp. 11 (© DB Apple/ dpa), 27 (© Corbis), 42 (© Ramin Talaie); Getty Images pp. 8 (Florence Delva), 19 (William Thomas Cain), 22 (ColorBlind Images), 25 (Jiji Press/AFP), 37 (Chris Jackson), 39 (Betsie Van der Meer), 40 (Alan Weller/ Bloomberg); Shutterstock pp. 9 (© Angela Waye), 12 (© Dmitry Kalinovsky), 14 (© Elena Elisseeva), 15(© Dmitriy Shironosov), 17 (© Ermolaev Alexander), 21 (© Arno van Dulmen), 34 (© dwphotos), 35 (© Franz Pfluegl), 38 (© YanLev); Superstock pp. 13 (Ambient Images Inc.), 36 (imagebroker.net).
Cover photograph of computer hackers using a computer reproduced with permission of Corbis (© Ocean).
We would like to thank Mark Clarkson for his invaluable help in the preparation of this book.
Every effort has been made to contact copyright holders of any material reproduced in this book. Any omissions will be rectified in subsequent printings if notice is given to the publisher.
Disclaimer All the internet addresses (URLs) given in this book were valid at the time of going to press. However, due to the dynamic nature of the internet, some addresses may have changed, or sites may have changed or ceased to exist since publication. While the author and publisher regret any inconvenience this may cause readers, no responsibility for any such changes can be accepted by either the author or the publisher.
Contents
Signs of trouble...................................................................... 4
Attack! ................................................................................... 8
Keeping information safe.....................................................14
Confirming the attack .......................................................... 20
Assessing the damage.......................................................... 26
Forensic computing.............................................................. 36
A secure future..................................................................... 44
Investigation: how to be anonymous .................................... 48
Timeline ............................................................................... 50
Glossary ............................................................................... 52
Find out more....................................................................... 54
Index .................................................................................... 56
Some words are printed in bold,like this. You can find out what they mean by looking in the glossary on page 52.
Sig
4
ns o
f
tr
o
After a long day at work, Ben relaxes with his laptop and a pizza. But it is not going to be the peaceful evening he had hoped for...
What’s this? I didn’t put that on my page!
u
bl
e
Last night  when the guys were here  where was my laptop?Is this a joke?
Voir Alternate Text
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text