Book description
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.
Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.
- Learn the tools and investigative principles of both physical and digital cybercrime investigations—and how they fit together to build a solid and complete case
- Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard"
- The only book to combine physical and digital investigative techniques
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Acknowledgments
- About the Author
- About the Technical Editor
- Foreword
- Preface
- Chapter 1. Introduction
- Chapter 2. High Tech Interview
- Chapter 3. Physical Investigations
- Chapter 4. Technical Investigations
- Chapter 5. Putting It All Together
- Chapter 6. Investigative Case Management
- Chapter 7. Case Presentation
- Chapter 8. Cheat Sheets and Quickstart Guides
- Chapter 9. Some Things Will Become Easier, Others Not So Much
- Chapter 10. Online Investigations
- Chapter 11. Case Studies
- Index
Product information
- Title: Placing the Suspect Behind the Keyboard
- Author(s):
- Release date: February 2013
- Publisher(s): Syngress
- ISBN: 9781597499842
You might also like
book
Hiding Behind the Keyboard
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert …
book
Scene of the Cybercrime: Computer Forensics Handbook
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, …
book
Malware Forensics Field Guide for Windows Systems
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential …
book
Computer Forensics: A Pocket Guide
How would your organisation cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer …