Book description
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details the scope of cyber forensics to reveal and track legal and illegal activity.
Table of contents
- Front cover
- Disclaimer
- Dedication
- Dedication
- Contents (1/2)
- Contents (2/2)
- Foreword
- Acknowledgments
- About the Authors
- Chapter 1. Introduction (1/6)
- Chapter 1. Introduction (2/6)
- Chapter 1. Introduction (3/6)
- Chapter 1. Introduction (4/6)
- Chapter 1. Introduction (5/6)
- Chapter 1. Introduction (6/6)
- Chapter 2. Cyber Forensic Tools and Utilities (1/5)
- Chapter 2. Cyber Forensic Tools and Utilities (2/5)
- Chapter 2. Cyber Forensic Tools and Utilities (3/5)
- Chapter 2. Cyber Forensic Tools and Utilities (4/5)
- Chapter 2. Cyber Forensic Tools and Utilities (5/5)
- Chapter 3. Concealment Techniques (1/14)
- Chapter 3. Concealment Techniques (2/14)
- Chapter 3. Concealment Techniques (3/14)
- Chapter 3. Concealment Techniques (4/14)
- Chapter 3. Concealment Techniques (5/14)
- Chapter 3. Concealment Techniques (6/14)
- Chapter 3. Concealment Techniques (7/14)
- Chapter 3. Concealment Techniques (8/14)
- Chapter 3. Concealment Techniques (9/14)
- Chapter 3. Concealment Techniques (10/14)
- Chapter 3. Concealment Techniques (11/14)
- Chapter 3. Concealment Techniques (12/14)
- Chapter 3. Concealment Techniques (13/14)
- Chapter 3. Concealment Techniques (14/14)
- Chapter 4. Hardware: Model System Platforms (1/6)
- Chapter 4. Hardware: Model System Platforms (2/6)
- Chapter 4. Hardware: Model System Platforms (3/6)
- Chapter 4. Hardware: Model System Platforms (4/6)
- Chapter 4. Hardware: Model System Platforms (5/6)
- Chapter 4. Hardware: Model System Platforms (6/6)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (1/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (2/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (3/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (4/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (5/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (6/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (7/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (8/8)
- Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (1/3)
- Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (2/3)
- Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (3/3)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (1/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (2/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (3/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (4/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (5/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (6/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (7/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (8/8)
- Chapter 8. Privacy and Cyber Forensics: An Australian Perspective (1/2)
- Chapter 8. Privacy and Cyber Forensics: An Australian Perspective (2/2)
- Chapter 9. Forensic Black Bag (1/3)
- Chapter 9. Forensic Black Bag (2/3)
- Chapter 9. Forensic Black Bag (3/3)
- Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (1/3)
- Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (2/3)
- Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (3/3)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (1/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (2/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (3/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (4/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (5/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (6/6)
- Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (1/3)
- Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (2/3)
- Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (3/3)
- Chapter 13. Electronically Stored Information and Cyber Forensics (1/4)
- Chapter 13. Electronically Stored Information and Cyber Forensics (2/4)
- Chapter 13. Electronically Stored Information and Cyber Forensics (3/4)
- Chapter 13. Electronically Stored Information and Cyber Forensics (4/4)
- Chapter 14. Cyber Forensic Awareness: Management Survey (1/3)
- Chapter 14. Cyber Forensic Awareness: Management Survey (2/3)
- Chapter 14. Cyber Forensic Awareness: Management Survey (3/3)
- Appendix A: Computer Forensic Forensic Web Sites
- Appendix B: Cyber Crime and Forensic Organizations (1/2)
- Appendix B: Cyber Crime and Forensic Organizations (2/2)
- Appendix C: Cyber Forensic Training Resources List
- Appendix D: Pertinent Legistlation
- Appendix E: Recommended Readings
- Appendix F: Management Assessment: 20 Questions
- Appendix G: Flowchart for the Seizure of a Personal Digital Assistant
- Appendix H: Additional Information: Computer Hardware
- Appendix I: Questions That Every Cyber Investigator Should Ask; before, during, and after an Investigation (1/2)
- Appendix I: Questions That Every Cyber Investigator Should Ask; before, during, and after an Investigation (2/2)
- Appendix J: Cyber Forensic Best Practcice Recommendations (1/2)
- Appendix J: Cyber Forensic Best Practcice Recommendations (2/2)
- Appendix K: Steganography Tools
- Appendix L: Forensic Resources-Literature and Selected Readings
- Appendix M: Forensic Online Resources (1/2)
- Appendix M: Forensic Online Resources (2/2)
- Appendix N: Locating Forensic Data in Windows Registries (1/4)
- Appendix N: Locating Forensic Data in Windows Registries (2/4)
- Appendix N: Locating Forensic Data in Windows Registries (3/4)
- Appendix N: Locating Forensic Data in Windows Registries (4/4)
- Appendix O: Sedona Principles for Electronic Document Production
- Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments (1/2)
- Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments (2/2)
- Appendix Q: Selected Acronyms
- Appendix R: Generic Cellular Telephone Search Warrants
- Appendix S: Generic Computer Search Warrant (1/2)
- Appendix S: Generic Computer Search Warrant (2/2)
- Appendix T: Generic Affidavit for Search Warrant
- Appendix U: Configuring the Investigator's Forensic Analysis Machine
- Appendix V: Generic Search Warrant
- Appendix W: Statement of Underlying Facts and Circumtances
- Appendix X: Generic State Court Order-Seizure of Electronic Hardware and Records (1/2)
- Appendix X: Generic State Court Order-Seizure of Electronic Hardware and Records (2/2)
- Appendix Y: Consent to Search
- Appendix Z: Confidential Cyber Forensics Questionnaire
- Appendix AA: Forensic Case Study: Files from the Field
- Glossary of Terms (1/4)
- Glossary of Terms (2/4)
- Glossary of Terms (3/4)
- Glossary of Terms (4/4)
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
- Back cover
Product information
- Title: Cyber Forensics, 2nd Edition
- Author(s):
- Release date: December 2010
- Publisher(s): Auerbach Publications
- ISBN: 9781439848234
You might also like
book
Computer Forensics
Presenting background information in computer and information systems and their use in the cyber environment, this …
book
Digital Forensics
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, …
book
Cyber Security and Digital Forensics
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, …
book
Digital Forensics and Internet of Things
DIGITAL FORENSICS AND INTERNET OF THINGS It pays to be ahead of the criminal, and this …