Computer Forensics: Computer Crime Scene Investigation

Overview

The Most Comprehensive, Up-to-Date, Reference on Computer Forensics!

Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, ...

See more details below
This Paperback (3E) is Not Available through BN.com
Sending request ...

Overview

The Most Comprehensive, Up-to-Date, Reference on Computer Forensics!

Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.
 
KEY FEATURES
Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks
Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter
CD includes tools, presentations, and demos of the latest computer forensics software
Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verifi cation; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms
 
On the CD-ROM
(See Appendix G for Details)
Includes a collection of forensic tools, demonstrations, docs, product presentations, and figures from the book. Topics and demos include: analysis tools, data recovery, forensic examination checklists, instant messenger issues, litigation, forensic training and certification information, case profiles, and more
 
SYSTEM REQUIREMENTS
The third party software contained on the CD-ROM runs on a variety of platforms and operating systems. Please consult Appendix G for more details, and especially Web site information for specific requirements, updates, etc. Minimum system requirements for all of these software products include Adobe Acrobat 5.0 or higher, Windows 2000, XP; an Internet connection; some also require basic hardware such as Firewire, USB Devices, Zip, Jaz, Floppy Diskettes, or hard disk drives (IDE, EIDE, SCSI, ATA, SATA).

Read More Show Less

Product Details

  • ISBN-13: 9780763779979
  • Publisher: Jones & Bartlett Learning
  • Publication date: 8/30/2017
  • Edition description: 3E
  • Edition number: 3
  • Pages: 1000

Meet the Author

John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.

Read More Show Less

Table of Contents

Acknowledgments
Foreword
Introduction

Part I Overview of Computer Forensics Technology
Chapter 1 Computer Forensics Fundamentals
Chapter 2 Types of Computer Forensics Technology
Chapter 3 Types of Computer Forensics Systems
Chapter 4 Vendor and Computer Forensics Services

Part II Computer Forensics Evidence and Capture
Chapter 5 Data Recovery
Chapter 6 Evidence Collection and Data Seizure
Chapter 7 Duplication and Preservation of Digital Evidence
Chapter 8 Computer Image Verification and Authentication

Part III Computer Forensics Analysis
Chapter 9 Discovery of Electronic Evidence
Chapter 10 Identification of Data
Chapter 11 Reconstructing Past Events
Chapter 12 Networks

Part IV Countermeasures: Information Warfare
Chapter 13 Fighting Against Macro Threats: Defensive Strategies
Chapter 14 The Information Warfare Arsenal and Tactics of the Military
Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies
Chapter 17 The Information Warfare Arsenal of the Future
Chapter 18 Surveillance Tools for Information Warfare of the Future
Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare

Part V Advanced Computer Forensics Systems and Future Directions
Chapter 20 Advanced Computer Forensics
Chapter 21 Summary, Conclusions, and Recommendations

Appendix A Frequently Asked Questions
Appendix B Computer Forensics Resources
Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages
Appendix D More Computer Forensics Cases
Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter
Appendix F Checklists by Chapter
Appendix G About the CD-ROM
Appendix H Glossary of Terms and Acronyms
Index

Read More Show Less

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)