Book description
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.
You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to:
Prepare for and conduct computer forensics investigations
Find and filter data
Protect personal privacy
Transfer evidence without contaminating it
Anticipate legal loopholes and opponents’ methods
Handle passwords and encrypted data
Work with the courts and win the case
Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Table of contents
- Copyright
- About The Authors
- Authors' Acknowledgments
- Publisher's Acknowledgments
- Introduction
-
I. Digging Out and Documenting Electronic Evidence
- 1. Knowing What Your Digital Devices Create, Capture, and Pack Away — Until Revelation Day
- 2. Suiting Up for a Lawsuit or Criminal Investigation
- 3. Getting Authorized to Search and Seize
- 4. Documenting and Managing the Crime Scene
-
II. Preparing to Crack the Case
- 5. Minding and Finding the Loopholes
- 6. Acquiring and Authenticating E-Evidence
- 7. Examining E-Evidence
- 8. Extracting Hidden Data
-
III. Doing Computer Forensics Investigations
- 9. E-Mail and Web Forensics
- 10. Data Forensics
- 11. Document Forensics
- 12. Mobile Forensics
- 13. Network Forensics
- 14. Investigating X-Files: eXotic Forensics
-
IV. Succeeding in Court
- 15. Holding Up Your End at Pretrial
- 16. Winning a Case Before You Go to Court
- 17. Standing Your Ground in Court
-
V. The Part of Tens
-
18. Ten Ways to Get Qualified and Prepped for Success
-
18.1. The Front Ten: Certifications
- 18.1.1. ACE: AccessData
- 18.1.2. CCE: Certified Computer Examiner
- 18.1.3. CFCE: Certified Forensic Computer Examiner
- 18.1.4. CEECS: Certified Electronic Evidence Collection Specialist
- 18.1.5. Cisco: Various certifications
- 18.1.6. CISSP: Certified Information Systems Security Professional
- 18.1.7. CompTia: Various certifications
- 18.1.8. EnCE: Guidance Software
- 18.1.9. Paraben training
- 18.1.10. SANS and GCFA: GIAC Certified Forensics Analyst
- 18.2. The Back Ten: Journals and Education
-
18.1. The Front Ten: Certifications
-
19. Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness
- 19.1. Stick to Finding and Telling the Truth
- 19.2. Don't Fall for Counsel's Tricks in Court
- 19.3. Be Irrefutable
- 19.4. Submit a Descriptive, Complete Bill
- 19.5. Prepare a Clear, Complete Report
- 19.6. Understand Nonverbal Cues
- 19.7. Look 'Em Straight in the Eye
- 19.8. Dress for Your Role As a Professional
- 19.9. Stay Certified and Up-to-Date
- 19.10. Know When to Say No
- 20. Ten Cool Tools for Computer Forensics
-
18. Ten Ways to Get Qualified and Prepped for Success
- Glossary
Product information
- Title: Computer Forensics For Dummies®
- Author(s):
- Release date: October 2008
- Publisher(s): For Dummies
- ISBN: 9780470371916
You might also like
book
Computer Forensics: A Pocket Guide
How would your organisation cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer …
book
Computer Forensics JumpStart, Second Edition
Essential reading for launching a career in computer forensics Internet crime is on the rise, catapulting …
book
The Best Damn Cybercrime and Digital Forensics Book Period
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched …
book
Scene of the Cybercrime: Computer Forensics Handbook
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, …