°øµ¿ÀúÀÚ ÀÌÁØÇü¡¤Á¶Á¤¿ø ¾¾ ¡°µðÁöÅÐ Æ÷·»½Ä À̷С¤½Ç½À º´Çà °¡´ÉÇØ¡±
[º¸¾È´º½º ±Ç ÁØ] ÃÖ±Ù »çÀ̹ö »ó¿¡¼ ÷´Ü±â¼úÀ» ¾Ç¿ëÇÑ ¹üÁË°¡ Áõ°¡ÇÏ¸é¼ µðÁöÅÐ ¹üÁ˸¦ ¹ýÁ¤¿¡¼ ±Ô¸íÇÏ°í Áõ¸íÇϱâ À§ÇÑ ÀýÂ÷¿Í ¹æ¹ýÀ» ¶æÇÏ´Â µðÁöÅÐ Æ÷·»½Ä ±â¹ýÀÌ °¢±¤À» ¹Þ°í ÀÖ´Ù.
ÀÌ·¯ÇÑ °¡¿îµ¥ µðÁöÅÐ Æ÷·»½Ä¿¡ ´ëÇØ ±âÃʺÎÅÍ È°¿ë±îÁö ´Ù·ï º¸¾ÈÀü¹®°¡, ¹ý·ü°¡µéÀº ¹°·Ð º¸¾È ºÐ¾ß¿¡ °ü½É ÀÖ´Â ÀϹÝÀε鵵 ½±°Ô °øºÎÇÒ ¼ö ÀÖ´Â ¡®µðÁöÅйüÁËÇöÀå¿¡¼ Á¦3ÀÇ Áõ°Å¸¦ ã¾Æ¶ó! µðÁöÅÐ Æ÷·»½ÄÀÇ ¼¼°è¡¯(ÃâÆÇ»ç : ÀÎÆ÷´õºÏ½º)°¡ Ãâ°£µÅ ÈÁ¦¸¦ ¸ðÀ¸°í ÀÖ´Ù.
ÀÌ Ã¥¿¡¼´Â µðÁöÅÐ Æ÷·»½Ä¿¡ °üÇÑ ÀüüÀûÀÎ °³¿ä, ¹ý·ü, »ç·Ê¿¡¼ºÎÅÍ µðÁöÅÐ Æ÷·»½Ä ¼öÇà°úÁ¤¿¡ ÇÊ¿äÇÑ Live Response¿Í ¸Þ¸ð¸® ¹× ÆÄÀϽýºÅÛ ºÐ¼®, µðÁöÅÐ Æ÷·»½Ä°ú °ü·ÃµÈ µµ±¸, ¾÷¹« ¼öÇà ½Ã ÇÊ¿äÇÑ Âü°íÁö½Ä µîÀº ¹°·Ð °¢Á¾ ÀÀ¿ë¹®Á¦¸¦ ÅëÇØ µðÁöÅÐ Æ÷·»½Ä ºÐ¼® ÇÁ·Î¼¼½º¸¦ ÀÍÈú ¼ö ÀÖµµ·Ï ±¸¼ºÇß´Ù.
ÀÌ Ã¥ÀÇ °øµ¿ÀúÀÚÀÎ ÀÌÁØÇü, Á¶Á¤¿ø ¾¾´Â ¡°±âÁ¸ÀÇ µðÁöÅÐ Æ÷·»½Ä Ã¥µéÀÌ ´ëºÎºÐ ¿Ü±¹¼Àû ¹ø¿ªº»ÀÌ¾î¼ ³»¿ëÀ» ÀÌÇØÇϱⰡ ½±Áö ¾Ê¾Ò´Ù¡±¸ç, ¡°ÀÌ¿¡ ´Ù¸¥ »ç¶÷µéÀÌ Á»´õ ½±°Ô ÀÌÇØÇÒ ¼ö ÀÖµµ·Ï ±×°£ °øºÎ¸¦ ÅëÇØ ÀÍÇô¿Ô´ø ¹æ¹ýµéÀ» Áß½ÉÀ¸·Î ¼¼úÇß´Ù¡±°í ¹àÇû´Ù.
ÇöÀç ÀÌ Ã¥Àº Àü±¹ ´ëÇü¼Á¡ ¹× ¿Â¶óÀÎ ¼Á¡À» ÅëÇØ ÆǸŸ¦ ½ÃÀÛÇßÀ¸¸ç, ÀÎÆ÷´õºÏ½º(02-719-6931)¸¦ ÅëÇؼµµ ±¸¸Å°¡ °¡´ÉÇÏ´Ù.
[µµ¼Á¤º¸]
µµ¼¸í : µðÁöÅйüÁËÇöÀå¿¡¼ Á¦3ÀÇ Áõ°Å¸¦ ã¾Æ¶ó! µðÁöÅÐ Æ÷·»½ÄÀÇ ¼¼°è
Àú ÀÚ : ÀÌÁØÇü, Á¶Á¤¿ø
ÆäÀÌÁö : 512ÂÊ
ÆÇ Çü : 185*245
°¡ °Ý : 34,000¿ø
I S B N : 978-89-94567-14-3
[ÀúÀÚ ¼Ò°³]
ÀÌÁØÇü
¡¤°Ç¾ç´ëÇб³ Á¤º¸º¸È£Çаú ÀçÇÐ Áß
¡¤ºñ°ø°³ ¸ðÀÇÇØÅ· ÇÁ·ÎÁ§Æ®/¹ö±×ÇåÆà ÇÁ¸®·£¼
¡¤´Ù¼ö Çб³ º¸¾È ÃÊû°ÀÇ
¡¤º¸¾È ºí·Î±× ¿î¿µ : http://maj3sty.tistory.com
Á¶Á¤¿ø
¡¤KTH Á¤º¸º¸È£ÆÀ(2011.11~ÇöÀç)
¸ðÀÇÇØÅ· / ÀÎÇÁ¶ó ±â¼úÀû º¸¾È Áø´Ü / ħÇØ»ç°í ´ëÀÀ / º¸¾È Àåºñ ¿î¿µ
¡¤¿¡À̾²¸® ½ÃÅ¥¸®Æ¼ (2006.11~2011.11)
-À¥ ¾îÇø®ÄÉÀ̼Ç/¸ð¹ÙÀÏ/¹«¼±³×Æ®¿öÅ©/½ÃÅ¥¾î ÄÚµù Áø´Ü/ ´ë±â¾÷/°ø°ø±â°ü ´Ù¼ö ±³À°
¡¤º¸¾È ÇÁ·ÎÁ§Æ® ¿î¿µÀÚ(www.boanproject.com)
-BackTrack, Metasploit, Æ÷·»½Ä, ¾Ç¼ºÄÚµå ºÐ¼® µî 20¿©°³ÀÇ ÇÁ·ÎÁ§Æ® ¿¬±¸ ÁøÇà
¡¤ÃâÆÇ ¹× ¹ø¿ª
-¡®Å©·¡Ä¿ Àâ´Â ¸íŽÁ¤ ÇØÄ¿¡¯ °øµ¿ ÀúÀÚ
-ASP.NET Security for Developer ¹ø¿ª Âü¿©
-Volatility v2.1 Command ¹ø¿ª Âü¿©
[Â÷·Ê]
Chapter 01 ù ¹ø° µðÁöÅйüÁË ÇöÀå
Section 1. µðÁöÅÐ Æ÷·»½Ä ÀϹÝ
Section 2. Digital Forensic °ü·Ã ¹ý±Ô ¹× »ç·Ê
Section 3. Digital Forensic °ü·Ã ÀÚ°ÝÁõ
Section 4. CoC(Chain of Custody)
Section 5. E - discovery ÀüÀÚÁõ°Å°³½ÃÁ¦
Section 6. µðÁöÅÐ Æ÷·»½Ä Áغñµµ
Section 7. µðÁöÅÐ Æ÷·»½Ä µ¿Çâ
Chapter 02 µÎ ¹ø° µðÁöÅйüÁË ÇöÀå
Section 1. Live Response
Section 2. Memory ºÐ¼®
Section 3. File System ºÐ¼®
Section 4. Registry ºÐ¼®
Chapter 03 ¼¼ ¹ø° µðÁöÅйüÁË ÇöÀå
Section 1. PE(Portable Executable) ±¸Á¶ ºÐ¼®
Section 2. Anti Forensics
Section 3. Digital Forensics Tool¿¡ ´ëÇÑ °£´ÜÇÑ ¼Ò°³
Chapter 04 ³× ¹ø° µðÁöÅйüÁË ÇöÀå
Section 1. Windows XP/Vista/7¿¡¼ÀÇ ¾ÆƼÆÑÆ®
Section 2. Windows 8¿¡¼ÀÇ ¾ÆƼÆÑÆ®
Section 3. Web Browser ºÐ¼®
Section 4. ÇÁ¸°ÅÍ ½ºÇ®·¯ ºÐ¼®
Chapter 05 ´Ù¼¸ ¹ø° µðÁöÅйüÁË ÇöÀå
Section 1. Live Response ½ºÅ©¸³Æ® ÀÛ¼º ¹æ¹ý
Section 2. The Sleuth Kit »ç¿ë ¸Å´º¾ó
Section 3. Autopsy v2(v3)
[±Ç ÁØ ±âÀÚ(editor@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>