Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

( 3 )

Overview

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only ...

See more details below
Paperback
$55.14
BN.com price
(Save 8%)$59.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (15) from $46.79   
  • New (12) from $46.79   
  • Used (3) from $55.13   
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$59.95
BN.com price

Overview

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

Read More Show Less

Editorial Reviews

From the Publisher

"Shavers, with a background in the military and law enforcement, offers a comprehensive look at the unique complexities that can be involved in civil and criminal investigation where digital technologies play a significant and often deciding role. The book delves into the many aspects of digital investigations. Techniques of analysis for both ‘live’ (powered on) and ‘dead’ (powered off) computers are discussed. Suspect and victim interview techniques unique to digital investigations are presented."--Reference & Research Book News, December 2013 "I would highly recommend the book to anyone in the field of digital investigation, computer forensics, or who may just have an interest in the fascinating world of cybercrime investigation. This is a must read for any aspiring novice cybercrime investigator and the seasoned professional computer guru as well as a needed addition to any digital investigator’s library."--Journal of Digital Forensics, Security and Law, Volume 8(2), 2013 "This book offers a complete picture of a cybercrime investigation, and with the author's clear and interesting writing, it manages to give aspiring digital forensic investigators a good idea of what such a job entails when working with law enforcement. It's a very easy and engaging read."--Help Net Security online, September 5, 2013

Read More Show Less

Product Details

  • ISBN-13: 9781597499859
  • Publisher: Elsevier Science
  • Publication date: 3/15/2013
  • Pages: 320
  • Sales rank: 692,973
  • Product dimensions: 7.40 (w) x 9.10 (h) x 0.90 (d)

Meet the Author

Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department’s first digital forensics lab in a small, cluttered storage closet.
Read More Show Less

Table of Contents

Chapter 1. Introduction

Chapter 2. High Tech Interview

Chapter 3. Physical Investigations

Chapter 4. Technical Investigations

Chapter 5. Putting it all Together

Chapter 6. Investigative Case Management

Chapter 7. Case Presentation

Chapter 8. Cheat Sheets and Quickstart Guides

Chapter 9. Some Things will Become Easier, Others Not So Much

Chapter 10. Online Investigations

Chapter 11. Case Studies

Read More Show Less

Customer Reviews

Average Rating 4.5
( 3 )
Rating Distribution

5 Star

(1)

4 Star

(2)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Posted August 6, 2013

    I wanted to take a look at a computer-based topic not normally i

    I wanted to take a look at a computer-based topic not normally in my programming domain and chose Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects by Brett Shavers (O’Reilly Media). As a former police officer, I found some of the discussions around generic evidence preservation to be slightly difficult to stay engaged with. However, as a whole, Placing the Suspect Behind the Keyboard did not disappoint my desire to see what digital forensics was all about. After reading this book, the reader should have a solid foundation to start delving into both the investigative and technical areas of a digital forensic investigator.

    Placing the Suspect Behind the Keyboard takes the reader though a step-by-step process to ensure that digital investigations and interviews are carried out in a manner that will preserve the integrity of both your evidence and your suspects involvement. Shavers reminds us throughout the book that it is not just about finding critical evidence on the digital device - but also ensuring that you can place the suspect “behind the keyboard” while those actions were occurring With excellent references back to sources to keep you on track, Placing the Suspect Behind the Keyboard keeps the reader in line with well-established investigative procedures. In addition, the Shavers also covers how to appropriately present your evidence to different types of audiences - something that is more challenging than most assume.
    I highly recommend this book to a person just getting into digital forensics or that is looking for taking their technical knowledge to the next level. While not a highly technical book, it is a great introduction into the digital forensics field.

    Disclaimer: I received a free electronic copy of this book as part of the O’Reilly Blogger Program

    Was this review helpful? Yes  No   Report this review
  • Posted May 8, 2013

    Are you an investigator in law enforcement? If you are, then thi

    Are you an investigator in law enforcement? If you are, then this book is for you! Author Brett Shavers, has done an outstanding job of writing a book that places the suspect behind the keyboard through a combination of digital forensics techniques and more traditional, non-technical investigative methods.




    Author Shavers, begins by reminding you that depending upon the type of digital evidence, the type of investigation, and whether the suspect has been already identified, the manner of collection of the data will differ. In addition, the author discusses the questions that are needed for interrogations that are related to computer-related investigations. He then focuses on physical investigations, detailing only those points that are useful in supporting currently available electronic evidence, or finding additional sources of electronic evidence. The author then, covers the principles of extracting and interpreting digital evidence that can help place the suspect behind the keyboard. Next, he shows you how to identify the suspect; as well as, eliminating possible suspects by helping to develop your investigative mindset. In addition, the author introduces several methods, which may allow you to see inferences as you manage the information in your case. He continues by discussing methods of presenting electronic evidence for a variety of audiences. Then, the author shows you how to use reference materials as a constant reminder of staying the course in a case of placing the suspect behind the keyboard. Next, he discusses how technological changes make it easier for digital forensics and the investigator’s ability to place a suspect behind a keyboard; and, how other times, these changes can make it difficult or impossible. In addition, the author shows you advanced techniques to search for information beyond simply using a search engine. Finally, he shows you a collection of briefed examples across a wide range of case studies. 




    Although the theme of this most excellent book primarily supports criminal investigations, many of the same methods and processes can be used in civil litigation and internal corporate matters. Perhaps more importantly, the principles presented in this great book are meant to be principles, not an absolute checklist, but a guide.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 6, 2014

    No text was provided for this review.

Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)