Book description
"Having worked with Erik on some of the most challenging computer forensic investigations during the early years of this industry's formation as well as having competed with him earnestly in the marketplace...I can truly say that Erik is one of the unique pioneers of computer forensic investigations. He not only can distill complex technical information into easily understandable concepts, but he always retained a long-term global perspective on the relevancy of our work and on the impact of the information revolution on the social and business structures of tomorrow."
—From the Foreword by James Gordon, Managing Director, Navigant Consulting, Inc.
Get the knowledge you need to make informed decisions throughout the computer forensic investigation process
Investigative Computer Forensics zeroes in on a real need felt by lawyers, jurists, accountants, administrators, senior managers, and business executives around the globe: to understand the forensic investigation landscape before having an immediate and dire need for the services of a forensic investigator.
Author Erik Laykin—leader and pioneer of computer forensic investigations—presents complex technical information in easily understandable concepts, covering:
A primer on computers and networks
Computer forensic fundamentals
Investigative fundamentals
Objectives and challenges in investigative computer forensics
E-discovery responsibilities
The future of computer forensic investigations
Get the knowledge you need to make tough decisions during an internal investigation or while engaging the capabilities of a computer forensic professional with the proven guidance found in Investigative Computer Forensics.
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- Foreword
- Preface
- Acknowledgments
- Author's Note
- Introduction: Investigative Computer Forensics
- Chapter 1: The Glue
-
Chapter 2: A Primer on Computers and Networks
- The Mechanics of Electronically Stored Information
- Optical Drives
- The Server
- The Router
- Application Data
- Metadata
- Databases
- Internet Data
- E-mail Mechanics
- The IP Address
- Computer Time Artifacts
- Social Media
- Tablets
- Cellular Telephones and Smartphones
- Audio and Video
- The Global Nervous System: Worldwide Data
- Fundamentals of Network Traffic
- The Firewall
- Data- and Traffic-Gathering Applications
- Dynamic Data Capture
- The Cloud
- International Data Security and Privacy Issues
- Chapter 3: Computer Forensic Fundamentals
- Chapter 4: Investigative Fundamentals
- Chapter 5: The Underpinnings of Investigative Computer Forensics
-
Chapter 6: Tactical Objectives and Challenges in Investigative Computer Forensics
- Preparing for the Attack
- Early Case Assessment
- Investigative Pacing, Timing, and Setting Expectations
- Working with Multinational Teams
- Collections of Electronic Data in the Cloud and in Social Media
- Investigating Internet Service Provider Records
- Bridging the Actual World with the Cyberworld
- Packaging the Findings
-
Chapter 7: The Cyber-Firefighters
- Incident Response Fundamentals
- Data Breaches
- Theft and Fraud
- Systems Failures
- Internal Investigations
- The Real-Time Predicament
- Building a Global Resource Network
- Honeypots and Other Attractive Intel-Gathering Targets
- Databases and Structured Data
- Organized Crime in the Cyber-Underworld
- The Cyber-Underworld in Various Regions
- State-Sponsored Cybercrime
- Identity Theft
- Intellectual Property and Trade Secret Theft
- Botnets, Malware, Trojans, and Phishing
- Data Breach Vulnerabilities
- Hackers and Their Environment
- Chapter 8: E-Discovery Responsibilities
-
Chapter 9: The Future
- Privacy and the Data Ecosystem
- Access Controls and the Evolution of Trust
- Global Communications Systems in the Cloud
- Nanotechnology and Cognitive Computing
- Digital Demographics and the Emerging Global Citizen
- Extra-National Investigative Networks and the Information Union
- Zero Day Forensics
- Concluding Thoughts
- About the Author
- Index
Product information
- Title: Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives
- Author(s):
- Release date: April 2013
- Publisher(s): Wiley
- ISBN: 9780470932407
You might also like
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …
book
Networking Fundamentals
Become well-versed with basic networking concepts such as routing, switching, and subnetting, and prepare for the …
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …
book
You, Only Better
If you want to be happy, fulfilled and energised its probably best not to obsess over …