Digital Evidence and Computer Crime / Edition 2

Hardcover (Print)
Buy New
Buy New from BN.com
$60.71
Buy Used
Buy Used from BN.com
$47.62
(Save 41%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Hardcover)
  • All (25) from $1.99   
  • New (5) from $2.49   
  • Used (20) from $1.99   

Overview

Digital evidence—evidence that is stored on or transmitted by computers—can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,
collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.
This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.
Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about:
• Components of computer networks
• Use of computer networks in an investigation
• Abuse of computer networks
• Privacy and security issues on computer networks
• The law as it applies to computer networks

Audience: Computer forensic consultants, law enforcement, computer security professionals (INFOSEC), government agencies (IRS, FBI, CIA, Dept. of Justice), fraud examiners, system administrators, lawyers.

Read More Show Less

Editorial Reviews

From the Publisher
Praise for the First Edition:
"Author Eoghan Casey does a superb job of applying forensic science to computers." (Ben Rothke, SecurityManagement.com)

Praise for Second Edition:
"[S]omething for everyone - law enforcement agencies that collect and process evidence, forensic analysts, lawyers and other information security professionals." (ComputerWorld)

"Eoghan Casey's Digital Evidence and Computer Crime is, in the opinion of this reviewer, the single most comprehensive and useful professional reference - or graduate-level textbook - in the computer forensics field today." (Gary Kessler, Criminal Justice Review)

"Digital Evidence and Computer Crime is a must-have in the reference library of any computer forensics professional, laboratory, and/or practice." (Gary Kessler, Criminal Justice Review)

Read More Show Less

Product Details

  • ISBN-13: 9780121631048
  • Publisher: Elsevier Science
  • Publication date: 3/8/2004
  • Edition description: REV
  • Edition number: 2
  • Pages: 688
  • Product dimensions: 7.56 (w) x 9.96 (h) x 1.26 (d)

Meet the Author

Eoghan Casey is an internationally recognized expert in data breach investigations and information security forensics. He is founding partner of CASEITE.com, and co-manages the Risk Prevention and Response business unit at DFLabs. Over the past decade, he has consulted with many attorneys, agencies, and police departments in the United States, South America, and Europe on a wide range of digital investigations, including fraud, violent crimes, identity theft, and on-line criminal activity. Eoghan has helped organizations investigate and manage security breaches, including network intrusions with international scope. He has delivered expert testimony in civil and criminal cases, and has submitted expert reports and prepared trial exhibits for computer forensic and cyber-crime cases.

In addition to his casework and writing the foundational book Digital Evidence and Computer Crime, Eoghan has worked as R&D Team Lead in the Defense Cyber Crime Institute (DCCI) at the Department of Defense Cyber Crime Center (DC3) helping enhance their operational capabilities and develop new techniques and tools. He also teaches graduate students at Johns Hopkins University Information Security Institute and created the Mobile Device Forensics course taught worldwide through the SANS Institute. He has delivered keynotes and taught workshops around the globe on various topics related to data breach investigation, digital forensics and cyber security.

Eoghan has performed thousands of forensic acquisitions and examinations, including Windows and UNIX systems, Enterprise servers, smart phones, cell phones, network logs, backup tapes, and database systems. He also has information security experience, as an Information Security Officer at Yale University and in subsequent consulting work. He has performed vulnerability assessments, deployed and maintained intrusion detection systems, firewalls and public key infrastructures, and developed policies, procedures, and educational programs for a variety of organizations. Eoghan has authored advanced technical books in his areas of expertise that are used by practitioners and universities around the world, and he is Editor-in-Chief of Elsevier's International Journal of Digital Investigation.

Read More Show Less

Table of Contents

Part 1 - 1: Digital Evidence and Computer Crime; 2: History and Terminology of Computer Crime Investigation; 3: Technology and Law; 4: The Investigative Process; 5: Investigative Reconstruction; 6: Modus Operandi, Motive & Technology; 7: Digital Evidence in the Courtroom; Part 2 - 8: Computer Basics for Digital Evidence Examiners; 9: Applying Forensic Science to Computers; 10: Forensic Analysis of Windows Systems
Chapter 11: Forensic Analysis of Unix Systems; 12: Forensic Analysis of Macintosh Systems; 13: Forensic Analysis of Handheld Devices; Part 3 - 14: Network Basics for Digital Evidence Examiners; 15: Applying Forensic Science to Networks; 16: Digital Evidence on Physical and Data-Link Layers; 17: Digital Evidence on Network and Transport Layers; 18: Digital Evidence on the Internet; Part 4 - 19: Investigating Computer Intrusions; 20: Sex Offenders on the Internet; 21: Investigating Cyberstalking; 22: Digital Evidence as Alibi

Read More Show Less

Customer Reviews

Average Rating 4
( 2 )
Rating Distribution

5 Star

(0)

4 Star

(2)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)