Computer Forensics: Principles and Practices: Prentice Hall Security
Autor Linda Volonino, Reynaldo Anzaldua, Jana Godwinen Limba Engleză Paperback – 31 iul 2006
Preț: 844.54 lei
Preț vechi: 1096.80 lei
-23% Nou
Puncte Express: 1267
Preț estimativ în valută:
161.64€ • 168.47$ • 134.56£
161.64€ • 168.47$ • 134.56£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780131547278
ISBN-10: 0131547275
Pagini: 534
Dimensiuni: 191 x 232 x 20 mm
Greutate: 0.82 kg
Ediția:1
Editura: Prentice Hall
Seria Prentice Hall Security
Locul publicării:Upper Saddle River, United States
ISBN-10: 0131547275
Pagini: 534
Dimensiuni: 191 x 232 x 20 mm
Greutate: 0.82 kg
Ediția:1
Editura: Prentice Hall
Seria Prentice Hall Security
Locul publicării:Upper Saddle River, United States
Descriere
For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation
By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.
By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.
Cuprins
Contents in Brief
PART ONE: Admissibility of Electronic Evidence ........................1
PART TWO: Preparing for E-Evidence Collection
and Preservation ....................................................................79
PART THREE: Forensic Examination of Computers
and Digital and Electronic Media ......................................193
PART FOUR: Detecting Intrusions, Malware, and Fraud ........317
PART FIVE: Legal, Ethical, and Testimony Topics....................405
Appendix A: Online Resources ....................................................467
Appendix B: Government and Legal References ..............................472
Appendix C: Sample Legal Forms, Letters, and Motions ....................478
Appendix D: Summaries of Court Cases ........................................504
Glossary ..................................................................................508
References ................................................................................516
Index ......................................................................................523
PART ONE: Admissibility of Electronic Evidence ........................1
- Forensic Evidence and Crime Investigation ......................................3
- Computer Forensics and Digital Detective Work ..............................38
PART TWO: Preparing for E-Evidence Collection
and Preservation ....................................................................79
- Tools, Environments, Equipment, and Certifications ..........................81
- Policies and Procedures..............................................................120
- Data, PDA, and Cell Phone Forensics ..........................................157
PART THREE: Forensic Examination of Computers
and Digital and Electronic Media ......................................193
- Operating Systems and Data Transmission Basics for Digital
- Investigating Windows, Linux, and Graphics Files ........................236
- E-Mail and Webmail Forensics ....................................................282
PART FOUR: Detecting Intrusions, Malware, and Fraud ........317
- Internet and Network Forensics and Intrusion Detection ..................319
- Tracking Down Those Who Intend to Do Harm on a Large Scale ....348
- Fraud and Forensic Accounting Investigation ................................372
PART FIVE: Legal, Ethical, and Testimony Topics....................405
- Federal Rules and Criminal Codes ..............................................407
- Ethical and Professional Responsibility in Testimony ......................436
Appendix A: Online Resources ....................................................467
Appendix B: Government and Legal References ..............................472
Appendix C: Sample Legal Forms, Letters, and Motions ....................478
Appendix D: Summaries of Court Cases ........................................504
Glossary ..................................................................................508
References ................................................................................516
Index ......................................................................................523
Textul de pe ultima copertă
Master the techniques for gathering electronic evidence and explore the new frontier of crime investigation.
The demand for computer forensics experts greatly exceeds the supply. With the rapid growth of technology in all parts of our lives, criminal activity must be tracked down and investigated using electronic methods that require up-to-date techniques and knowledge of the latest software tools. Authors Linda Volonino, Jana Godwin, and Reynaldo Anzaldua share their expertise to give you the legal, technical, and investigative skills you need to launch your career in computer forensics. You can also use Computer Forensics: Principles and Practices to help you advance in careers such as criminal justice, accounting, law enforcement, and federal investigation.
Computer Forensics: Principles and Practicesgives you in-depth understanding of:
This book is filled with tools to help you move beyond simply learning concepts and help you apply them. These tools include:
· In Practice tutorials: Apply concepts and learn by doing.
· Exercises and Projects: Assignments show you how to employ your new skills.
The companion Web site (www.prenhall.com/security) includes:
· Additional testing materials and projects to reinforce book lessons.
· Downloadable checklists and templates used in the book.
· Links to additional topics and resources to assist you in your professional development.
The demand for computer forensics experts greatly exceeds the supply. With the rapid growth of technology in all parts of our lives, criminal activity must be tracked down and investigated using electronic methods that require up-to-date techniques and knowledge of the latest software tools. Authors Linda Volonino, Jana Godwin, and Reynaldo Anzaldua share their expertise to give you the legal, technical, and investigative skills you need to launch your career in computer forensics. You can also use Computer Forensics: Principles and Practices to help you advance in careers such as criminal justice, accounting, law enforcement, and federal investigation.
Computer Forensics: Principles and Practicesgives you in-depth understanding of:
- Using the correct investigative tools and procedures to maximize effectiveness of evidence gathering.
- Keeping evidence in pristine condition so it will be admissible in a legal action.
- The legal foundations for proper handling of traditional and electronic evidence such as the Federal Rules of Evidence and Procedure as well as the Fourth Amendment and other laws regarding search warrants and civil rights.
- Practical tools such as FTK, EnCase, Passware, Ethereal, LADS, WinHex, GIMP, Camouflage, and Snort.
This book is filled with tools to help you move beyond simply learning concepts and help you apply them. These tools include:
· In Practice tutorials: Apply concepts and learn by doing.
· Exercises and Projects: Assignments show you how to employ your new skills.
- Case Studies: Apply what you learn in real-world scenarios.
The companion Web site (www.prenhall.com/security) includes:
· Additional testing materials and projects to reinforce book lessons.
· Downloadable checklists and templates used in the book.
· Links to additional topics and resources to assist you in your professional development.
Caracteristici
For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigations
- By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.
- A: Computer Forensics: Principles and Practice covers how to investigate crime scenes, intrusions, and hacker attacks—as well as how to gather and analyze digital evidence to discover the truth about what happened—with a comprehensive understanding and hands-on use of one of the most widely-used computer forensics software tools—EnCase.
- Unlike other books that frustrate students and faculty by requiring use of operating systems they do not have access to, this book does not require arcane equipment to learn how to use computer forensics software.
- A: Computer Forensics: Principles and Practices covers three key areas—computer technology, recognized investigative techniques, and legal issues. Without an understanding of these three areas, mistakes will be made that could have alarming consequences. with or tainted.
- A. Students learn the technical expertise needed to gather, filter, and authenticate e-evidence for use in court or legal actions with knowledge of relevant laws regarding civil rights, search warrants, and rules of evidence.
- Introduction to digital investigations with concepts, terminology and issues, in addition to practical skills in multiple types of computer, Internet, and digital device forensics.
- Provides students with a strong foundation in electronic evidence collection and handling, chain of custody, documentation, testifying as an expert witness, and surviving harsh cross-examination. - Solid coverage of forensics tools, techniques, and environments plus rules of evidence and privacy rights
- Provides students with a comprehensive analysis of the role of e-evidence in computer crimes, cyberterrorism, traditional and violent crimes, incident responses, civil cases, fraud and information security verification - Coverage of often neglected subject areas—e.g. PDA forensics, cell phone forensics, email and Internet forensics; tracking down hackers and serial killers.
- Introduces students to important forensics investigative issues that are often overlooked in other texts. - End-of-chapter exercises, projects, and review questions.
- Enables students to apply their new knowledge and expertise. - Extensive extra features, practical applications and FYI’s throughout.
- Provides students with practical knowledge to help them understand their technical role, legal obligations, and ethical responsibilities. - Technical, Investigative, and Legal Glossary and Appendices
- Multiple appendices with additional resources, forms, and checklists to manage and document the case life cycle involving e-evidence.