Book description
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of system forensics.
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Content
- Preface
- About the Author
-
PART I Introduction to Forensics
-
CHAPTER 1 Introduction to Forensics
- What Is Computer Forensics?
- Understanding the Field of Digital Forensics
- Knowledge Needed for Computer Forensics Analysis
- The Daubert Standard
-
U.S. Laws Affecting Digital Forensics
- The Federal Privacy Act of 1974
- The Privacy Protection Act of 1980
- The Communications Assistance for Law Enforcement Act of 1994
- The Electronic Communications Privacy Act of 1986
- The Computer Security Act of 1987
- The Foreign Intelligence Surveillance Act of 1978
- The Child Protection and Sexual Predator Punishment Act of 1998
- The Children’s Online Privacy Protection Act of 1998
- The Communications Decency Act of 1996
- The Telecommunications Act of 1996
- The Wireless Communications and Public Safety Act of 1999
- The USA Patriot Act of 2001
- The Sarbanes-Oxley Act of 2002
- 18 U.S.C. § 1030: Fraud and Related Activity in Connection with Computers
- 18 U.S.C. § 1020: Fraud and Related Activity in Connection with Access Devices
- The Digital Millennium Copyright Act (DMCA) of 1998
- 18 U.S.C. § 1028A: Identity Theft and Aggravated Identity Theft
- 18 U.S.C. § 2251: Sexual Exploitation of Children
- Warrants
- Federal Guidelines
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 1 ASSESSMENT
- CHAPTER 2 Overview of Computer Crime
- CHAPTER 3 Forensic Methods and Labs
-
CHAPTER 1 Introduction to Forensics
-
PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
- CHAPTER 4 Collecting, Seizing, and Protecting Evidence
- CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information
- CHAPTER 6 Recovering Data
- CHAPTER 7 Email Forensics
- CHAPTER 8 Windows Forensics
-
CHAPTER 9 Linux Forensics
- Linux and Forensics
- Linux Basics
- Linux File Systems
- Linux Logs
- Linux Directories
-
Shell Commands for Forensics
- The dmesg Command
- The fsck Command
- The grep Command
- The history Command
- The mount Command
- The ps Command
- The pstree Command
- The pgrep Command
- The top Command
- The kill Command
- The file Command
- The su Command
- The who Command
- The finger Command
- The dd Command
- The ls Command
- Can You Undelete in Linux?
- Manual Method
- Kali Linux Forensics
- Forensics Tools for Linux
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 9 ASSESSMENT
- CHAPTER 10 Macintosh Forensics
- CHAPTER 11 Mobile Forensics
- CHAPTER 12 Performing Network Analysis
-
PART III Incident Response and Resources
- CHAPTER 13 Incident and Intrusion Response
- CHAPTER 14 Trends and Future Directions
- CHAPTER 15 System Forensics Resources
- APPENDIX A Answer Key
- APPENDIX B Standard Acronyms
- Glossary of Key Terms
- References
- Index
Product information
- Title: System Forensics, Investigation, and Response, 3rd Edition
- Author(s):
- Release date: August 2017
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284121858
You might also like
book
Digital Forensics and Incident Response - Second Edition
Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques Key …
book
Digital Forensics and Incident Response
A practical guide to deploying digital forensic techniques in response to cyber security incidents About This …
book
Hands-on Incident Response and Digital Forensics
In this practical guide, the relationship between incident response and digital forensics is explored and you …
book
Digital Forensics and Incident Response - Third Edition
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques …