Join Books.org — it's free

Book cover of Computer Forensics: Computer Crime Scene Investigation
Networking & Telecommunications, Computer Business & Culture, Law Enforcement, True Crime, Computers - General & Miscellaneous

Computer Forensics: Computer Crime Scene Investigation

by
Write a review

Overview

The Most Comprehensive, Up-to-Date, Reference on Computer Forensics!

Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.
 
KEY FEATURES
Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks
Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter
CD includes tools, presentations, and demos of the latest computer forensics software
Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verifi cation; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms
 
On the CD-ROM
(See Appendix G for Details)
Includes a collection of forensic tools, demonstrations, docs, product presentations, and figures from the book. Topics and demos include: analysis tools, data recovery, forensic examination checklists, instant messenger issues, litigation, forensic training and certification information, case profiles, and more
 
SYSTEM REQUIREMENTS
The third party software contained on the CD-ROM runs on a variety of platforms and operating systems. Please consult Appendix G for more details, and especially Web site information for specific requirements, updates, etc. Minimum system requirements for all of these software products include Adobe Acrobat 5.0 or higher, Windows 2000, XP; an Internet connection; some also require basic hardware such as Firewire, USB Devices, Zip, Jaz, Floppy Diskettes, or hard disk drives (IDE, EIDE, SCSI, ATA, SATA).

Synopsis

No matter how secure computer users think their information is, chances are there are hackers who can access it. This comprehensive reference provides readers with all the information and software they need to track down these computer criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. The book contains a thorough overview of the subject from basic definitions to data recovery techniques to auditing methods to terrorist cyber-attacks. Numerous exercises, case studies, and vignettes of actual criminal methods enhance the topics under discussion, providing the reader with solutions to computer crime in the real world. Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Case Studies and Vignettes.

KEY FEATURES

  • Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods and services
  • Discusses data seizure and analysis, preservation of computer evidence, reconstruction of events and information warfare
  • Exercises, case studies, and vignettes of actual computer crimes are used
  • CD includes demos of the latest computer forensics and auditing software
 

About the Author, John R. Vacca

John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.

Reviews

Log in to write a review.

There are no reviews yet.

Book Details

Published
Publisher
Jones & Bartlett Learning, LLC
Pages
1000
Format
Paperback
ISBN
9780763779979