Handbook of Computer Crime Investigation: Forensic Tools and Technology / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (16) from $1.99   
  • New (4) from $75.80   
  • Used (12) from $1.99   

Overview

Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey has brought together an expert panel of authors to create this detailed guide for professionals who are already familiar with digital evidence. This unique handbook explains how to locate an utilize evidence in computer hard drives, shared networks, wireless devices, or embedded systems. The use of currently available high-tech tools is discussed and real case examples are provided.

To provide individuals with a deeper understanding of the forensic analysis of computer systems, three primary themes are treated:

Tools: Software and hardware for collecting and analyzing digital evidence are presented and their strengths and limitations are discussed. The section provides details on leading hardware and software programs-such as EnCase, Dragon, and ForensiX-with each chapter written by that product's creator.

Technology: This section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, and Windows and Unix operating systems, progressing to network, wireless and embedded systems.

Case examples: These actual situations demonstrate the technical, legal, and practical challenges that arise in real computer investigations.

The Handbook of Computer Crime Investigation is an essential technical reference and on-the-job guide for professionals in computing, security and investigation, forensic science, legal and law enforcement communities.

Audience: Law enforcement personnel and computer professionals who specialize in digital evidence collection and analysis. Also: forensic scientists, lawyers and network security professionals.

Read More Show Less

Editorial Reviews

From the Publisher
...any library serving them would find this an excellent introduction - E-Streams
Any law firm looking to get into the field would do well to start here. - E-Streams
...a useful introduction to an increasingly important field - E-Streams
From The Critics
Detailed technical information is presented that can be used to help solve crime involving computers, for professionals who are already familiar with digital evidence. The handbook tells how to locate and use evidence in computer hard drives, shared networks, wireless devices, and embedded systems. Advantages and disadvantages of software and hardware for collecting and analyzing digital evidence are discussed, and instructions are given for collecting and analyzing digital evidence in common situations. Case examples demonstrate technical, legal, and practical challenges. Casey is a system security administrator for Yale University. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780121631031
  • Publisher: Elsevier Science
  • Publication date: 10/22/2001
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 464
  • Product dimensions: 0.94 (w) x 6.69 (h) x 9.61 (d)

Meet the Author

Eoghan Casey is an internationally recognized expert in data breach investigations and information security forensics. He is founding partner of CASEITE.com, and co-manages the Risk Prevention and Response business unit at DFLabs. Over the past decade, he has consulted with many attorneys, agencies, and police departments in the United States, South America, and Europe on a wide range of digital investigations, including fraud, violent crimes, identity theft, and on-line criminal activity. Eoghan has helped organizations investigate and manage security breaches, including network intrusions with international scope. He has delivered expert testimony in civil and criminal cases, and has submitted expert reports and prepared trial exhibits for computer forensic and cyber-crime cases.

In addition to his casework and writing the foundational book Digital Evidence and Computer Crime, Eoghan has worked as R&D Team Lead in the Defense Cyber Crime Institute (DCCI) at the Department of Defense Cyber Crime Center (DC3) helping enhance their operational capabilities and develop new techniques and tools. He also teaches graduate students at Johns Hopkins University Information Security Institute and created the Mobile Device Forensics course taught worldwide through the SANS Institute. He has delivered keynotes and taught workshops around the globe on various topics related to data breach investigation, digital forensics and cyber security.

Eoghan has performed thousands of forensic acquisitions and examinations, including Windows and UNIX systems, Enterprise servers, smart phones, cell phones, network logs, backup tapes, and database systems. He also has information security experience, as an Information Security Officer at Yale University and in subsequent consulting work. He has performed vulnerability assessments, deployed and maintained intrusion detection systems, firewalls and public key infrastructures, and developed policies, procedures, and educational programs for a variety of organizations. Eoghan has authored advanced technical books in his areas of expertise that are used by practitioners and universities around the world, and he is Editor-in-Chief of Elsevier's International Journal of Digital Investigation.

Read More Show Less

Read an Excerpt

The author of the best-selling Digital Evidence and Computer Crime teams up with top forensic experts to bring you the first indepth guide to computer crime fighting tools and technology!
Read More Show Less

Table of Contents

About the Authors
Acknowledgements
1. Introduction
2. The Other Side of Civil Discovery
TOOLS
3. The EnCase Process
4. Incident Response Tools
5. NFR Security
6. Tool Testing and Analytical Methodology
TECHNOLOGY
7. Windows Analysis
8. Unix Analysis
9. Network Analysis
10. Wireless Network Analysis
11. Embedded Systems Analysis
CASE EXAMPLES
12. Homicide and Child Pornography
13. Internet Gambling
14. Computer Intrusions
Author Index
Subject Index

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted June 4, 2013

    I¿m loving McDonalds for fast food... MyDeals247 for the best de

    I’m loving McDonalds for fast food... MyDeals247 for the best deals;))

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)