Freshly Printed - allow 10 days lead
Handbook of Computer Crime Investigation
Forensic Tools and Technology
The author of the best-selling Digital Evidence and Computer Crime teams up with top forensic experts to bring you the first indepth guide to computer crime fighting tools and technology!
Eoghan Casey (Edited by)
9780121631031, Elsevier Science
Paperback / softback, published 22 October 2001
448 pages
24.4 x 17.5 x 2.8 cm, 1.13 kg
"The audience for this book is obviously the legal and law enforcement communities, so any library serving them would find this an excellent introduction. Any law firm looking to get into the field would do well to start here." --E-Streams"Academic law, business or computer science collections will, however, find this book a useful introduction to an increasingly important field - even large public libraries will find an eager audience in an uncertain world." --E-Streams
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
About the AuthorsAcknowledgements1. Introduction2. The Other Side of Civil DiscoveryTOOLS3. The EnCase Process4. Incident Response Tools5. NFR Security6. Tool Testing and Analytical MethodologyTECHNOLOGY7. Windows Analysis8. Unix Analysis9. Network Analysis10. Wireless Network Analysis11. Embedded Systems AnalysisCASE EXAMPLES12. Homicide and Child Pornography13. Internet Gambling14. Computer IntrusionsAuthor IndexSubject Index
Subject Areas: Computer fraud & hacking [URH], Computer security [UR], Forensic science [JKVF1], Criminal investigation & detection [JKVF], Crime & criminology [JKV]