Book description
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to inve
Table of contents
- Front cover
- Dedication
- Contents
- About the Author
- Preface
- Chapter 1. The Initial Contact
- Chapter 2. Client Site Arrival
- Chapter 3. Evidence Collection Procedures (1/2)
- Chapter 3. Evidence Collection Procedures (2/2)
- Chapter 4. Evidence Collection and Analysis Tools (1/9)
- Chapter 4. Evidence Collection and Analysis Tools (2/9)
- Chapter 4. Evidence Collection and Analysis Tools (3/9)
- Chapter 4. Evidence Collection and Analysis Tools (4/9)
- Chapter 4. Evidence Collection and Analysis Tools (5/9)
- Chapter 4. Evidence Collection and Analysis Tools (6/9)
- Chapter 4. Evidence Collection and Analysis Tools (7/9)
- Chapter 4. Evidence Collection and Analysis Tools (8/9)
- Chapter 4. Evidence Collection and Analysis Tools (9/9)
- Chapter 5. AccessData's Forensic Tool Kit (1/4)
- Chapter 5. AccessData's Forensic Tool Kit (2/4)
- Chapter 5. AccessData's Forensic Tool Kit (3/4)
- Chapter 5. AccessData's Forensic Tool Kit (4/4)
- Chapter 6. Guidance Software's EnCase (1/8)
- Chapter 6. Guidance Software's EnCase (2/8)
- Chapter 6. Guidance Software's EnCase (3/8)
- Chapter 6. Guidance Software's EnCase (4/8)
- Chapter 6. Guidance Software's EnCase (5/8)
- Chapter 6. Guidance Software's EnCase (6/8)
- Chapter 6. Guidance Software's EnCase (7/8)
- Chapter 6. Guidance Software's EnCase (8/8)
- Chapter 7. ILook Investigator (1/4)
- Chapter 7. ILook Investigator (2/4)
- Chapter 7. ILook Investigator (3/4)
- Chapter 7. ILook Investigator (4/4)
- Chapter 8. Password Recovery
- Chapter 9. Questions and Answers by Subject Area (1/4)
- Chapter 9. Questions and Answers by Subject Area (2/4)
- Chapter 9. Questions and Answers by Subject Area (3/4)
- Chapter 9. Questions and Answers by Subject Area (4/4)
- Chapter 10. Recommended Reference Materials (1/2)
- Chapter 10. Recommended Reference Materials (2/2)
- Chapter 11. Case Study (1/7)
- Chapter 11. Case Study (2/7)
- Chapter 11. Case Study (3/7)
- Chapter 11. Case Study (4/7)
- Chapter 11. Case Study (5/7)
- Chapter 11. Case Study (6/7)
- Chapter 11. Case Study (7/7)
- Appendix A: Glossary (1/2)
- Appendix A: Glossary (2/2)
- Appendix B: Port Numbers Used By Malicious Trojan Horse Programs
- Appendix C: Attack Signatures
- Appendix D: UNIX/Linux Commands (1/4)
- Appendix D: UNIX/Linux Commands (2/4)
- Appendix D: UNIX/Linux Commands (3/4)
- Appendix D: UNIX/Linux Commands (4/4)
- Appendix E: Cisco PIX Firewall Commands (1/2)
- Appendix E: Cisco PIX Firewall Commands (2/2)
- Appendix F: Discovering Unauthorized Access to Your Computer (1/2)
- Appendix F: Discovering Unauthorized Access to Your Computer (2/2)
- Appendix G: Electromagnetic Field Analyis (EFA) "Tickler"
- Appendix H: The Intelligence Community Since 9/11 (1/2)
- Appendix H: The Intelligence Community Since 9/11 (2/2)
- Appendix I: Answers to Chapter Questions (1/2)
- Appendix I: Answers to Chapter Questions (2/2)
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Cyber Crime Investigator's Field Guide, 2nd Edition
- Author(s):
- Release date: January 2005
- Publisher(s): Auerbach Publications
- ISBN: 9781420031324
You might also like
book
Cyber Crime Investigator's Field Guide, 3rd Edition
This third edition provides the investigative framework that needs to be followed, along with information about …
book
TechnoSecurity's Guide to E-Discovery and Digital Forensics
TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, …
book
Cyber Forensics: From Data to Digital Evidence
An explanation of the basic principles of data This book explains the basic principles of data …
book
Cyber Crime Investigations
Written by a former NYPD cyber cop, this is the only book available that discusses the …