Book description
Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it is from a network, an individual computer, a telephone system, or personal electronic device.
Table of contents
- Front cover
- Preface (1/2)
- Preface (2/2)
- About the Author
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- SECTION I: COMPUTER FORENSIC INVESTIGATION BASICS
- Chapter 1. Computer Forensic Investigation Basics (1/4)
- Chapter 1. Computer Forensic Investigation Basics (2/4)
- Chapter 1. Computer Forensic Investigation Basics (3/4)
- Chapter 1. Computer Forensic Investigation Basics (4/4)
- Chapter 2. Policies, Standards, Laws, and Legal Processes (1/7)
- Chapter 2. Policies, Standards, Laws, and Legal Processes (2/7)
- Chapter 2. Policies, Standards, Laws, and Legal Processes (3/7)
- Chapter 2. Policies, Standards, Laws, and Legal Processes (4/7)
- Chapter 2. Policies, Standards, Laws, and Legal Processes (5/7)
- Chapter 2. Policies, Standards, Laws, and Legal Processes (6/7)
- Chapter 2. Policies, Standards, Laws, and Legal Processes (7/7)
- Chapter 3. Computer Forensic Examination Categories (1/4)
- Chapter 3. Computer Forensic Examination Categories (2/4)
- Chapter 3. Computer Forensic Examination Categories (3/4)
- Chapter 3. Computer Forensic Examination Categories (4/4)
- Chapter 4. Computer, Internet, and Electronic Crimes (1/6)
- Chapter 4. Computer, Internet, and Electronic Crimes (2/6)
- Chapter 4. Computer, Internet, and Electronic Crimes (3/6)
- Chapter 4. Computer, Internet, and Electronic Crimes (4/6)
- Chapter 4. Computer, Internet, and Electronic Crimes (5/6)
- Chapter 4. Computer, Internet, and Electronic Crimes (6/6)
- Chapter 5. Computers, Electronics, and Networking Environment (1/4)
- Chapter 5. Computers, Electronics, and Networking Environment (2/4)
- Chapter 5. Computers, Electronics, and Networking Environment (3/4)
- Chapter 5. Computers, Electronics, and Networking Environment (4/4)
- Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (1/5)
- Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (2/5)
- Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (3/5)
- Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (4/5)
- Chapter 6. Investigative Tools, Technical Training, and Forensic Equipment (5/5)
- SECTION II: EVIDENCE COLLECTION AND MANAGEMENT
- Chapter 7. Managing the Crime/Incident Scene (1/6)
- Chapter 7. Managing the Crime/Incident Scene (2/6)
- Chapter 7. Managing the Crime/Incident Scene (3/6)
- Chapter 7. Managing the Crime/Incident Scene (4/6)
- Chapter 7. Managing the Crime/Incident Scene (5/6)
- Chapter 7. Managing the Crime/Incident Scene (6/6)
- Chapter 8. Investigating Computer Center Incidents (1/5)
- Chapter 8. Investigating Computer Center Incidents (2/5)
- Chapter 8. Investigating Computer Center Incidents (3/5)
- Chapter 8. Investigating Computer Center Incidents (4/5)
- Chapter 8. Investigating Computer Center Incidents (5/5)
- Chapter 9. Computer Systems Disk and File Structures (1/4)
- Chapter 9. Computer Systems Disk and File Structures (2/4)
- Chapter 9. Computer Systems Disk and File Structures (3/4)
- Chapter 9. Computer Systems Disk and File Structures (4/4)
- Chapter 10. The Computer and Electronic Forensic Lab (1/8)
- Chapter 10. The Computer and Electronic Forensic Lab (2/8)
- Chapter 10. The Computer and Electronic Forensic Lab (3/8)
- Chapter 10. The Computer and Electronic Forensic Lab (4/8)
- Chapter 10. The Computer and Electronic Forensic Lab (5/8)
- Chapter 10. The Computer and Electronic Forensic Lab (6/8)
- Chapter 10. The Computer and Electronic Forensic Lab (7/8)
- Chapter 10. The Computer and Electronic Forensic Lab (8/8)
- Chapter 11. Extracting Computer and Electronic Evidence (1/5)
- Chapter 11. Extracting Computer and Electronic Evidence (2/5)
- Chapter 11. Extracting Computer and Electronic Evidence (3/5)
- Chapter 11. Extracting Computer and Electronic Evidence (4/5)
- Chapter 11. Extracting Computer and Electronic Evidence (5/5)
- Chapter 12. E-Mail and Internet Investigations (1/6)
- Chapter 12. E-Mail and Internet Investigations (2/6)
- Chapter 12. E-Mail and Internet Investigations (3/6)
- Chapter 12. E-Mail and Internet Investigations (4/6)
- Chapter 12. E-Mail and Internet Investigations (5/6)
- Chapter 12. E-Mail and Internet Investigations (6/6)
- Chapter 13. Mobile Phone and PDA Investigations (1/6)
- Chapter 13. Mobile Phone and PDA Investigations (2/6)
- Chapter 13. Mobile Phone and PDA Investigations (3/6)
- Chapter 13. Mobile Phone and PDA Investigations (4/6)
- Chapter 13. Mobile Phone and PDA Investigations (5/6)
- Chapter 13. Mobile Phone and PDA Investigations (6/6)
- Chapter 14. Court Preparation, Presentations, and Testimony (1/4)
- Chapter 14. Court Preparation, Presentations, and Testimony (2/4)
- Chapter 14. Court Preparation, Presentations, and Testimony (3/4)
- Chapter 14. Court Preparation, Presentations, and Testimony (4/4)
- Glossary (1/4)
- Glossary (2/4)
- Glossary (3/4)
- Glossary (4/4)
- Appendix A (1/4)
- Appendix A (2/4)
- Appendix A (3/4)
- Appendix A (4/4)
- Appendix B: Forensic Cases and Exercises (1/2)
- Appendix B: Forensic Cases and Exercises (2/2)
- Appendix C: Answers to Review Questions (1/2)
- Appendix C: Answers to Review Questions (2/2)
- APPENDIX D: Binary and Hexadecimal Number Systems (1/2)
- APPENDIX D: Binary and Hexadecimal Number Systems (2/2)
- Bibliography
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Computer Forensics
- Author(s):
- Release date: March 2007
- Publisher(s): Auerbach Publications
- ISBN: 9780849305627
You might also like
video
Computer Forensics
This video based Computer Forensics training course expert Ric Messier will teach you how to get …
book
Computer Forensics For Dummies®
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For …
book
Computer Forensics: A Pocket Guide
How would your organisation cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer …
book
Scene of the Cybercrime: Computer Forensics Handbook
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, …