Computer And Intrusion Forensics
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.
1101758085
Computer And Intrusion Forensics
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.
109.0 In Stock
Computer And Intrusion Forensics

Computer And Intrusion Forensics

Computer And Intrusion Forensics

Computer And Intrusion Forensics

Hardcover(New Edition)

$109.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

Product Details

ISBN-13: 9781580533690
Publisher: Artech House, Incorporated
Publication date: 03/31/2003
Series: Computing Library
Edition description: New Edition
Pages: 424
Product dimensions: 7.00(w) x 10.00(h) x 0.94(d)

Table of Contents

Computer Crime, Computer Forensics and Computer Security

Introduction.

Human behaviour in the electronic age.

The nature of computer crime.

Establishing a case in computer forensics.

Legal considerations.

Computer security and its relationship to computer forensics.

Overview of the following chapters.

 

Current Practice

Introduction.

Electronic Evidence.

Forensic Tools.

Emerging Procedures and Standards.

Computer Crime Legislation and Computer Forensics.

Networks and Intrusion Forensics.

 

Computer Forensics in Law Enforcement and National Security

The Origins and History of Computer Forensics.

The Role of Computer Forensics in Law Enforcement.

Principles of Evidence.

Computer Forensics Model for Law Enforcement.

Forensic Examination. Forensic Resources and Tools.

Competencies and Certification.

Computer Forensics and National Security.

 

Computer Forensics in Forensic Accounting

Auditing and fraud detection.

Defining fraudulent activity.

Technology and fraud detection.

Fraud Detection Techniques.

Visual analysis techniques.

Building a fraud analysis model.

 

Case Studies

The Case of “Little Nicky” Scarfo.

The Case of ‘El Griton’.

Melissa.

The World Trade Centre Bombing and Operation Oplan Bojinka.

Other cases. 

 

Intrusion Detection and Intrusion Forensics

Intrusion detection, computer forensics and information warfare.

Intrusion Detection Systems.

Analysing Computer Intrusions.

Network Security.

Intrusion Forensics .

Future Directions for IDS and Intrusion Forensics.

 

Research Directions and Future Developments

Introduction.

Forensic Data Mining -- Finding Useful Patterns in Evidence.

Text Categorization.

Authorship Attribution: Identifying E-mail Authors.

Association Rule Mining – Application to Investigative Profiling.

Evidence Extraction, Link Analysis and Link Discovery.

Stego-Forensic Analysis. Image Mining.

Cryptography and Cryptanalysis.

The Future - Society and Technology.

From the B&N Reads Blog

Customer Reviews