Overview
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics!
Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.
KEY FEATURES
Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks
Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter
CD includes tools, presentations, and demos of the latest computer forensics software
Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verifi cation; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms
On the CD-ROM
(See Appendix G for Details)
Includes a collection of forensic tools, demonstrations, docs, product presentations, and figures from the book. Topics and demos include: analysis tools, data recovery, forensic examination checklists, instant messenger issues, litigation, forensic training and certification information, case profiles, and more
SYSTEM REQUIREMENTS
The third party software contained on the CD-ROM runs on a variety of platforms and operating systems. Please consult Appendix G for more details, and especially Web site information for specific requirements, updates, etc. Minimum system requirements for all of these software products include Adobe Acrobat 5.0 or higher, Windows 2000, XP; an Internet connection; some also require basic hardware such as Firewire, USB Devices, Zip, Jaz, Floppy Diskettes, or hard disk drives (IDE, EIDE, SCSI, ATA, SATA).
Synopsis
No matter how secure computer users think their information is, chances are there are hackers who can access it. This comprehensive reference provides readers with all the information and software they need to track down these computer criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. The book contains a thorough overview of the subject from basic definitions to data recovery techniques to auditing methods to terrorist cyber-attacks. Numerous exercises, case studies, and vignettes of actual criminal methods enhance the topics under discussion, providing the reader with solutions to computer crime in the real world. Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Case Studies and Vignettes.
KEY FEATURES
- Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods and services
- Discusses data seizure and analysis, preservation of computer evidence, reconstruction of events and information warfare
- Exercises, case studies, and vignettes of actual computer crimes are used
- CD includes demos of the latest computer forensics and auditing software