Computer Forensics

Book description

Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it is from a network, an individual computer, a telephone system, or personal electronic device.

Table of contents

  1. Front cover
  2. Preface (1/2)
  3. Preface (2/2)
  4. About the Author
  5. Contents (1/3)
  6. Contents (2/3)
  7. Contents (3/3)
  8. SECTION I: COMPUTER FORENSIC INVESTIGATION BASICS
  9. Chapter 1. Computer Forensic Investigation Basics (1/4)
  10. Chapter 1. Computer Forensic Investigation Basics (2/4)
  11. Chapter 1. Computer Forensic Investigation Basics (3/4)
  12. Chapter 1. Computer Forensic Investigation Basics (4/4)
  13. Chapter 2. Policies, Standards, Laws, and Legal Processes (1/7)
  14. Chapter 2. Policies, Standards, Laws, and Legal Processes (2/7)
  15. Chapter 2. Policies, Standards, Laws, and Legal Processes (3/7)
  16. Chapter 2. Policies, Standards, Laws, and Legal Processes (4/7)
  17. Chapter 2. Policies, Standards, Laws, and Legal Processes (5/7)
  18. Chapter 2. Policies, Standards, Laws, and Legal Processes (6/7)
  19. Chapter 2. Policies, Standards, Laws, and Legal Processes (7/7)
  20. Chapter 3. Computer Forensic Examination Categories (1/4)
  21. Chapter 3. Computer Forensic Examination Categories (2/4)
  22. Chapter 3. Computer Forensic Examination Categories (3/4)
  23. Chapter 3. Computer Forensic Examination Categories (4/4)
  24. Chapter 4. Computer, Internet, and Electronic Crimes (1/6)
  25. Chapter 4. Computer, Internet, and Electronic Crimes (2/6)
  26. Chapter 4. Computer, Internet, and Electronic Crimes (3/6)
  27. Chapter 4. Computer, Internet, and Electronic Crimes (4/6)
  28. Chapter 4. Computer, Internet, and Electronic Crimes (5/6)
  29. Chapter 4. Computer, Internet, and Electronic Crimes (6/6)
  30. Chapter 5. Computers, Electronics, and Networking Environment (1/4)
  31. Chapter 5. Computers, Electronics, and Networking Environment (2/4)
  32. Chapter 5. Computers, Electronics, and Networking Environment (3/4)
  33. Chapter 5. Computers, Electronics, and Networking Environment (4/4)
  34. Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (1/5)
  35. Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (2/5)
  36. Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (3/5)
  37. Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (4/5)
  38. Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (5/5)
  39. SECTION II: EVIDENCE COLLECTION AND MANAGEMENT
  40. Chapter 7. Managing the Crime/Incident Scene (1/6)
  41. Chapter 7. Managing the Crime/Incident Scene (2/6)
  42. Chapter 7. Managing the Crime/Incident Scene (3/6)
  43. Chapter 7. Managing the Crime/Incident Scene (4/6)
  44. Chapter 7. Managing the Crime/Incident Scene (5/6)
  45. Chapter 7. Managing the Crime/Incident Scene (6/6)
  46. Chapter 8. Investigating Computer Center Incidents (1/5)
  47. Chapter 8. Investigating Computer Center Incidents (2/5)
  48. Chapter 8. Investigating Computer Center Incidents (3/5)
  49. Chapter 8. Investigating Computer Center Incidents (4/5)
  50. Chapter 8. Investigating Computer Center Incidents (5/5)
  51. Chapter 9. Computer Systems Disk and File Structures (1/4)
  52. Chapter 9. Computer Systems Disk and File Structures (2/4)
  53. Chapter 9. Computer Systems Disk and File Structures (3/4)
  54. Chapter 9. Computer Systems Disk and File Structures (4/4)
  55. Chapter 10. The Computer and Electronic Forensic Lab (1/8)
  56. Chapter 10. The Computer and Electronic Forensic Lab (2/8)
  57. Chapter 10. The Computer and Electronic Forensic Lab (3/8)
  58. Chapter 10. The Computer and Electronic Forensic Lab (4/8)
  59. Chapter 10. The Computer and Electronic Forensic Lab (5/8)
  60. Chapter 10. The Computer and Electronic Forensic Lab (6/8)
  61. Chapter 10. The Computer and Electronic Forensic Lab (7/8)
  62. Chapter 10. The Computer and Electronic Forensic Lab (8/8)
  63. Chapter 11. Extracting Computer and Electronic Evidence (1/5)
  64. Chapter 11. Extracting Computer and Electronic Evidence (2/5)
  65. Chapter 11. Extracting Computer and Electronic Evidence (3/5)
  66. Chapter 11. Extracting Computer and Electronic Evidence (4/5)
  67. Chapter 11. Extracting Computer and Electronic Evidence (5/5)
  68. Chapter 12. E-Mail and Internet Investigations (1/6)
  69. Chapter 12. E-Mail and Internet Investigations (2/6)
  70. Chapter 12. E-Mail and Internet Investigations (3/6)
  71. Chapter 12. E-Mail and Internet Investigations (4/6)
  72. Chapter 12. E-Mail and Internet Investigations (5/6)
  73. Chapter 12. E-Mail and Internet Investigations (6/6)
  74. Chapter 13. Mobile Phone and PDA Investigations (1/6)
  75. Chapter 13. Mobile Phone and PDA Investigations (2/6)
  76. Chapter 13. Mobile Phone and PDA Investigations (3/6)
  77. Chapter 13. Mobile Phone and PDA Investigations (4/6)
  78. Chapter 13. Mobile Phone and PDA Investigations (5/6)
  79. Chapter 13. Mobile Phone and PDA Investigations (6/6)
  80. Chapter 14. Court Preparation, Presentations, and Testimony (1/4)
  81. Chapter 14. Court Preparation, Presentations, and Testimony (2/4)
  82. Chapter 14. Court Preparation, Presentations, and Testimony (3/4)
  83. Chapter 14. Court Preparation, Presentations, and Testimony (4/4)
  84. Glossary (1/4)
  85. Glossary (2/4)
  86. Glossary (3/4)
  87. Glossary (4/4)
  88. Appendix A (1/4)
  89. Appendix A (2/4)
  90. Appendix A (3/4)
  91. Appendix A (4/4)
  92. Appendix B: Forensic Cases and Exercises (1/2)
  93. Appendix B: Forensic Cases and Exercises (2/2)
  94. Appendix C: Answers to Review Questions (1/2)
  95. Appendix C: Answers to Review Questions (2/2)
  96. APPENDIX D: Binary and Hexadecimal Number Systems (1/2)
  97. APPENDIX D: Binary and Hexadecimal Number Systems (2/2)
  98. Bibliography
  99. Index (1/2)
  100. Index (2/2)
  101. Back cover

Product information

  • Title: Computer Forensics
  • Author(s): Robert C. Newman
  • Release date: March 2007
  • Publisher(s): Auerbach Publications
  • ISBN: 9780849305627