Cyber Forensics, 2nd Edition

Book description

Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details the scope of cyber forensics to reveal and track legal and illegal activity.

Table of contents

  1. Front cover
  2. Disclaimer
  3. Dedication
  4. Dedication
  5. Contents (1/2)
  6. Contents (2/2)
  7. Foreword
  8. Acknowledgments
  9. About the Authors
  10. Chapter 1. Introduction (1/6)
  11. Chapter 1. Introduction (2/6)
  12. Chapter 1. Introduction (3/6)
  13. Chapter 1. Introduction (4/6)
  14. Chapter 1. Introduction (5/6)
  15. Chapter 1. Introduction (6/6)
  16. Chapter 2. Cyber Forensic Tools and Utilities (1/5)
  17. Chapter 2. Cyber Forensic Tools and Utilities (2/5)
  18. Chapter 2. Cyber Forensic Tools and Utilities (3/5)
  19. Chapter 2. Cyber Forensic Tools and Utilities (4/5)
  20. Chapter 2. Cyber Forensic Tools and Utilities (5/5)
  21. Chapter 3. Concealment Techniques (1/14)
  22. Chapter 3. Concealment Techniques (2/14)
  23. Chapter 3. Concealment Techniques (3/14)
  24. Chapter 3. Concealment Techniques (4/14)
  25. Chapter 3. Concealment Techniques (5/14)
  26. Chapter 3. Concealment Techniques (6/14)
  27. Chapter 3. Concealment Techniques (7/14)
  28. Chapter 3. Concealment Techniques (8/14)
  29. Chapter 3. Concealment Techniques (9/14)
  30. Chapter 3. Concealment Techniques (10/14)
  31. Chapter 3. Concealment Techniques (11/14)
  32. Chapter 3. Concealment Techniques (12/14)
  33. Chapter 3. Concealment Techniques (13/14)
  34. Chapter 3. Concealment Techniques (14/14)
  35. Chapter 4. Hardware: Model System Platforms (1/6)
  36. Chapter 4. Hardware: Model System Platforms (2/6)
  37. Chapter 4. Hardware: Model System Platforms (3/6)
  38. Chapter 4. Hardware: Model System Platforms (4/6)
  39. Chapter 4. Hardware: Model System Platforms (5/6)
  40. Chapter 4. Hardware: Model System Platforms (6/6)
  41. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (1/8)
  42. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (2/8)
  43. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (3/8)
  44. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (4/8)
  45. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (5/8)
  46. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (6/8)
  47. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (7/8)
  48. Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (8/8)
  49. Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (1/3)
  50. Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (2/3)
  51. Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (3/3)
  52. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (1/8)
  53. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (2/8)
  54. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (3/8)
  55. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (4/8)
  56. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (5/8)
  57. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (6/8)
  58. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (7/8)
  59. Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (8/8)
  60. Chapter 8. Privacy and Cyber Forensics: An Australian Perspective (1/2)
  61. Chapter 8. Privacy and Cyber Forensics: An Australian Perspective (2/2)
  62. Chapter 9. Forensic Black Bag (1/3)
  63. Chapter 9. Forensic Black Bag (2/3)
  64. Chapter 9. Forensic Black Bag (3/3)
  65. Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (1/3)
  66. Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (2/3)
  67. Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (3/3)
  68. Chapter 11. Cyber Forensics and the Law: Legal Considerations (1/6)
  69. Chapter 11. Cyber Forensics and the Law: Legal Considerations (2/6)
  70. Chapter 11. Cyber Forensics and the Law: Legal Considerations (3/6)
  71. Chapter 11. Cyber Forensics and the Law: Legal Considerations (4/6)
  72. Chapter 11. Cyber Forensics and the Law: Legal Considerations (5/6)
  73. Chapter 11. Cyber Forensics and the Law: Legal Considerations (6/6)
  74. Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (1/3)
  75. Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (2/3)
  76. Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (3/3)
  77. Chapter 13. Electronically Stored Information and Cyber Forensics (1/4)
  78. Chapter 13. Electronically Stored Information and Cyber Forensics (2/4)
  79. Chapter 13. Electronically Stored Information and Cyber Forensics (3/4)
  80. Chapter 13. Electronically Stored Information and Cyber Forensics (4/4)
  81. Chapter 14. Cyber Forensic Awareness: Management Survey (1/3)
  82. Chapter 14. Cyber Forensic Awareness: Management Survey (2/3)
  83. Chapter 14. Cyber Forensic Awareness: Management Survey (3/3)
  84. Appendix A: Computer Forensic Forensic Web Sites
  85. Appendix B: Cyber Crime and Forensic Organizations (1/2)
  86. Appendix B: Cyber Crime and Forensic Organizations (2/2)
  87. Appendix C: Cyber Forensic Training Resources List
  88. Appendix D: Pertinent Legistlation
  89. Appendix E: Recommended Readings
  90. Appendix F: Management Assessment: 20 Questions
  91. Appendix G: Flowchart for the Seizure of a Personal Digital Assistant
  92. Appendix H: Additional Information: Computer Hardware
  93. Appendix I: Questions That Every Cyber Investigator Should Ask; before, during, and after an Investigation (1/2)
  94. Appendix I: Questions That Every Cyber Investigator Should Ask; before, during, and after an Investigation (2/2)
  95. Appendix J: Cyber Forensic Best Practcice Recommendations (1/2)
  96. Appendix J: Cyber Forensic Best Practcice Recommendations (2/2)
  97. Appendix K: Steganography Tools
  98. Appendix L: Forensic Resources-Literature and Selected Readings
  99. Appendix M: Forensic Online Resources (1/2)
  100. Appendix M: Forensic Online Resources (2/2)
  101. Appendix N: Locating Forensic Data in Windows Registries (1/4)
  102. Appendix N: Locating Forensic Data in Windows Registries (2/4)
  103. Appendix N: Locating Forensic Data in Windows Registries (3/4)
  104. Appendix N: Locating Forensic Data in Windows Registries (4/4)
  105. Appendix O: Sedona Principles for Electronic Document Production
  106. Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments (1/2)
  107. Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments (2/2)
  108. Appendix Q: Selected Acronyms
  109. Appendix R: Generic Cellular Telephone Search Warrants
  110. Appendix S: Generic Computer Search Warrant (1/2)
  111. Appendix S: Generic Computer Search Warrant (2/2)
  112. Appendix T: Generic Affidavit for Search Warrant
  113. Appendix U: Configuring the Investigator's Forensic Analysis Machine
  114. Appendix V: Generic Search Warrant
  115. Appendix W: Statement of Underlying Facts and Circumtances
  116. Appendix X: Generic State Court Order-Seizure of Electronic Hardware and Records (1/2)
  117. Appendix X: Generic State Court Order-Seizure of Electronic Hardware and Records (2/2)
  118. Appendix Y: Consent to Search
  119. Appendix Z: Confidential Cyber Forensics Questionnaire
  120. Appendix AA: Forensic Case Study: Files from the Field
  121. Glossary of Terms (1/4)
  122. Glossary of Terms (2/4)
  123. Glossary of Terms (3/4)
  124. Glossary of Terms (4/4)
  125. Index (1/4)
  126. Index (2/4)
  127. Index (3/4)
  128. Index (4/4)
  129. Back cover

Product information

  • Title: Cyber Forensics, 2nd Edition
  • Author(s): Albert Marcella Jr., Doug Menendez
  • Release date: December 2010
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439848234