Book description
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities and how cyber forensics can uncover them.
Table of contents
- Front cover
- Disclaimer
- Dedication
- Dedication
- Contents (1/2)
- Contents (2/2)
- Foreword
- Acknowledgments
- About the Authors
- Chapter 1. Introduction (1/6)
- Chapter 1. Introduction (2/6)
- Chapter 1. Introduction (3/6)
- Chapter 1. Introduction (4/6)
- Chapter 1. Introduction (5/6)
- Chapter 1. Introduction (6/6)
- Chapter 2. Cyber Forensic Tools and Utilities (1/5)
- Chapter 2. Cyber Forensic Tools and Utilities (2/5)
- Chapter 2. Cyber Forensic Tools and Utilities (3/5)
- Chapter 2. Cyber Forensic Tools and Utilities (4/5)
- Chapter 2. Cyber Forensic Tools and Utilities (5/5)
- Chapter 3. Concealment Techniques (1/14)
- Chapter 3. Concealment Techniques (2/14)
- Chapter 3. Concealment Techniques (3/14)
- Chapter 3. Concealment Techniques (4/14)
- Chapter 3. Concealment Techniques (5/14)
- Chapter 3. Concealment Techniques (6/14)
- Chapter 3. Concealment Techniques (7/14)
- Chapter 3. Concealment Techniques (8/14)
- Chapter 3. Concealment Techniques (9/14)
- Chapter 3. Concealment Techniques (10/14)
- Chapter 3. Concealment Techniques (11/14)
- Chapter 3. Concealment Techniques (12/14)
- Chapter 3. Concealment Techniques (13/14)
- Chapter 3. Concealment Techniques (14/14)
- Chapter 4. Hardware: Model System Platforms (1/6)
- Chapter 4. Hardware: Model System Platforms (2/6)
- Chapter 4. Hardware: Model System Platforms (3/6)
- Chapter 4. Hardware: Model System Platforms (4/6)
- Chapter 4. Hardware: Model System Platforms (5/6)
- Chapter 4. Hardware: Model System Platforms (6/6)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (1/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (2/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (3/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (4/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (5/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (6/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (7/8)
- Chapter 5. Software: Operating, Systems, Network Traffic, and Applications (8/8)
- Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (1/3)
- Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (2/3)
- Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards (3/3)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (1/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (2/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (3/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (4/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (5/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (6/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (7/8)
- Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires (8/8)
- Chapter 8. Privacy and Cyber Forensics: An Australian Perspective (1/2)
- Chapter 8. Privacy and Cyber Forensics: An Australian Perspective (2/2)
- Chapter 9. Forensic Black Bag (1/3)
- Chapter 9. Forensic Black Bag (2/3)
- Chapter 9. Forensic Black Bag (3/3)
- Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (1/3)
- Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (2/3)
- Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure (3/3)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (1/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (2/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (3/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (4/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (5/6)
- Chapter 11. Cyber Forensics and the Law: Legal Considerations (6/6)
- Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (1/3)
- Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (2/3)
- Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior (3/3)
- Chapter 13. Electronically Stored Information and Cyber Forensics (1/4)
- Chapter 13. Electronically Stored Information and Cyber Forensics (2/4)
- Chapter 13. Electronically Stored Information and Cyber Forensics (3/4)
- Chapter 13. Electronically Stored Information and Cyber Forensics (4/4)
- Chapter 14. Cyber Forensic Awareness: Management Survey (1/3)
- Chapter 14. Cyber Forensic Awareness: Management Survey (2/3)
- Chapter 14. Cyber Forensic Awareness: Management Survey (3/3)
- Appendix A: Computer Forensic Forensic Web Sites
- Appendix B: Cyber Crime and Forensic Organizations (1/2)
- Appendix B: Cyber Crime and Forensic Organizations (2/2)
- Appendix C: Cyber Forensic Training Resources List
- Appendix D: Pertinent Legistlation
- Appendix E: Recommended Readings
- Appendix F: Management Assessment: 20 Questions
- Appendix G: Flowchart for the Seizure of a Personal Digital Assistant
- Appendix H: Additional Information: Computer Hardware
- Appendix I: Questions That Every Cyber Investigator Should Ask; before, during, and after an Investigation (1/2)
- Appendix I: Questions That Every Cyber Investigator Should Ask; before, during, and after an Investigation (2/2)
- Appendix J: Cyber Forensic Best Practcice Recommendations (1/2)
- Appendix J: Cyber Forensic Best Practcice Recommendations (2/2)
- Appendix K: Steganography Tools
- Appendix L: Forensic Resources-Literature and Selected Readings
- Appendix M: Forensic Online Resources (1/2)
- Appendix M: Forensic Online Resources (2/2)
- Appendix N: Locating Forensic Data in Windows Registries (1/4)
- Appendix N: Locating Forensic Data in Windows Registries (2/4)
- Appendix N: Locating Forensic Data in Windows Registries (3/4)
- Appendix N: Locating Forensic Data in Windows Registries (4/4)
- Appendix O: Sedona Principles for Electronic Document Production
- Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments (1/2)
- Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments (2/2)
- Appendix Q: Selected Acronyms
- Appendix R: Generic Cellular Telephone Search Warrants
- Appendix S: Generic Computer Search Warrant (1/2)
- Appendix S: Generic Computer Search Warrant (2/2)
- Appendix T: Generic Affidavit for Search Warrant
- Appendix U: Configuring the Investigator's Forensic Analysis Machine
- Appendix V: Generic Search Warrant
- Appendix W: Statement of Underlying Facts and Circumtances
- Appendix X: Generic State Court Order-Seizure of Electronic Hardware and Records (1/2)
- Appendix X: Generic State Court Order-Seizure of Electronic Hardware and Records (2/2)
- Appendix Y: Consent to Search
- Appendix Z: Confidential Cyber Forensics Questionnaire
- Appendix AA: Forensic Case Study: Files from the Field
- Glossary of Terms (1/4)
- Glossary of Terms (2/4)
- Glossary of Terms (3/4)
- Glossary of Terms (4/4)
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
- Back cover
Product information
- Title: Cyber Forensics, 2nd Edition
- Author(s):
- Release date: December 2010
- Publisher(s): Auerbach Publications
- ISBN: 9781439848234
You might also like
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …
book
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get …
book
Practical Linux Forensics
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems …
book
Real-World Cryptography
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s …