Computer Forensics: Computer Crime Scene Investigation

Overview

Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and include fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organization's internal computer security specialists with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised ...

See more details below
This Paperback (3E) is Not Available through BN.com
Sending request ...

Overview

Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and include fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organization's internal computer security specialists with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised systems, ultimately saving the organization the high cost of hiring an outside team of computer forensic investigators. This updated Third Edition includes a comprehensive introduction to computer forensics investigative techniques and provides the knowledge and skills required to conduct a computer forensics investigation from initial discovery to completion. This book also provides the details for an organization's Computer Incident Response Team (CIRT); to collect, manage, and record digital evidence; and to leverage powerful software tools and techniques to uncover hidden or deleted information. Key topics include: Responding to incidents and investigating computer crime, conducting and managing an investigation, performing disk-based analysis, investigating information-hiding techniques, examining e-mail, tracing internet access, searching memory in real-time, and the forensics challenge competition.

Read More Show Less

Product Details

  • ISBN-13: 9780763779979
  • Publisher: Jones & Bartlett Learning
  • Publication date: 8/30/2017
  • Edition description: 3E
  • Edition number: 3
  • Pages: 1000

Meet the Author

John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.

Read More Show Less

Table of Contents

Acknowledgments
Foreword
Introduction

Part I Overview of Computer Forensics Technology
Chapter 1 Computer Forensics Fundamentals
Chapter 2 Types of Computer Forensics Technology
Chapter 3 Types of Computer Forensics Systems
Chapter 4 Vendor and Computer Forensics Services

Part II Computer Forensics Evidence and Capture
Chapter 5 Data Recovery
Chapter 6 Evidence Collection and Data Seizure
Chapter 7 Duplication and Preservation of Digital Evidence
Chapter 8 Computer Image Verification and Authentication

Part III Computer Forensics Analysis
Chapter 9 Discovery of Electronic Evidence
Chapter 10 Identification of Data
Chapter 11 Reconstructing Past Events
Chapter 12 Networks

Part IV Countermeasures: Information Warfare
Chapter 13 Fighting Against Macro Threats: Defensive Strategies
Chapter 14 The Information Warfare Arsenal and Tactics of the Military
Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies
Chapter 17 The Information Warfare Arsenal of the Future
Chapter 18 Surveillance Tools for Information Warfare of the Future
Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare

Part V Advanced Computer Forensics Systems and Future Directions
Chapter 20 Advanced Computer Forensics
Chapter 21 Summary, Conclusions, and Recommendations

Appendix A Frequently Asked Questions
Appendix B Computer Forensics Resources
Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages
Appendix D More Computer Forensics Cases
Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter
Appendix F Checklists by Chapter
Appendix G About the CD-ROM
Appendix H Glossary of Terms and Acronyms
Index

Read More Show Less

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)