Cantitate/Preț
Produs

Computer Forensics: Principles and Practices: Prentice Hall Security

Autor Linda Volonino, Reynaldo Anzaldua, Jana Godwin
en Limba Engleză Paperback – 31 iul 2006
For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics. "
Citește tot Restrânge

Preț: 85482 lei

Preț vechi: 111015 lei
-23% Nou

Puncte Express: 1282

Preț estimativ în valută:
16359 17043$ 13602£

Carte indisponibilă temporar

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780131547278
ISBN-10: 0131547275
Pagini: 534
Dimensiuni: 191 x 232 x 20 mm
Greutate: 0.82 kg
Ediția:1
Editura: Prentice Hall
Seria Prentice Hall Security

Locul publicării:Upper Saddle River, United States

Descriere

For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation
 
By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.   

Cuprins

Contents in Brief
 
PART ONE: Admissibility of Electronic Evidence ........................1
  1. Forensic Evidence and Crime Investigation ......................................3
  2. Computer Forensics and Digital Detective Work ..............................38
 
PART TWO: Preparing for E-Evidence Collection
and Preservation ....................................................................79
  1. Tools, Environments, Equipment, and Certifications ..........................81
  2. Policies and Procedures..............................................................120
  3. Data, PDA, and Cell Phone Forensics ..........................................157
 
PART THREE: Forensic Examination of Computers
and Digital and Electronic Media ......................................193
  1. Operating Systems and Data Transmission Basics for Digital
Investigations ............................................................................195
  1. Investigating Windows, Linux, and Graphics Files ........................236
  2. E-Mail and Webmail Forensics ....................................................282
 
PART FOUR: Detecting Intrusions, Malware, and Fraud ........317
  1. Internet and Network Forensics and Intrusion Detection ..................319
  2. Tracking Down Those Who Intend to Do Harm on a Large Scale ....348
  3. Fraud and Forensic Accounting Investigation ................................372
 
PART FIVE: Legal, Ethical, and Testimony Topics....................405
  1. Federal Rules and Criminal Codes ..............................................407
  2. Ethical and Professional Responsibility in Testimony ......................436
 
Appendix A: Online Resources ....................................................467
Appendix B: Government and Legal References ..............................472
Appendix C: Sample Legal Forms, Letters, and Motions ....................478
Appendix D: Summaries of Court Cases ........................................504
Glossary ..................................................................................508
References ................................................................................516
Index ......................................................................................523
 
 

Textul de pe ultima copertă

Master the techniques for gathering electronic evidence and explore the new frontier of crime investigation.  
 
The demand for computer forensics experts greatly exceeds the supply. With the rapid growth of technology in all parts of our lives, criminal activity must be tracked down and investigated using electronic methods that require up-to-date techniques and knowledge of the latest software tools. Authors Linda Volonino, Jana Godwin, and Reynaldo Anzaldua share their expertise to give you the legal, technical, and investigative skills you need to launch your career in computer forensics. You can also use Computer Forensics: Principles and Practices  to help you advance in careers such as criminal justice, accounting, law enforcement, and federal investigation.
 
Computer Forensics: Principles and Practicesgives you in-depth understanding of:
  • Using the correct investigative tools and procedures to maximize effectiveness of evidence gathering.
  • Keeping evidence in pristine condition so it will be admissible in a legal action.
·         Investigating large-scale attacks such as identity theft, fraud, phishing, extortion, and malware infections.
  • The legal foundations for proper handling of traditional and electronic evidence such as the Federal Rules of Evidence and Procedure as well as the Fourth Amendment and other laws regarding search warrants and civil rights.
  • Practical tools such as FTK, EnCase, Passware, Ethereal, LADS, WinHex, GIMP, Camouflage, and Snort.
 
This book is filled with tools to help you move beyond simply learning concepts and help you apply them. These tools include:
·         In Practice tutorials: Apply concepts and learn by doing.
·         Exercises and Projects: Assignments show you how to employ your new skills. 
  • Case Studies: Apply what you learn in real-world scenarios.
 
The companion Web site (www.prenhall.com/security) includes:
·         Additional testing materials and projects to reinforce book lessons.
·         Downloadable checklists and templates used in the book.
·         Links to additional topics and resources to assist you in your professional development.
 
 
 
 

Caracteristici

For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigations
  • By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics. 
Q. Would you like comprehensive coverage of forensics and hands-on exercises that students can actually perform?
  • A: Computer Forensics: Principles and Practice covers how to investigate crime scenes, intrusions, and hacker attacks—as well as how to gather and analyze digital evidence to discover the truth about what happened—with a comprehensive understanding and hands-on use of one of the most widely-used computer forensics software tools—EnCase.
  • Unlike other books that frustrate students and faculty by requiring use of operating systems they do not have access to, this book does not require arcane equipment to learn how to use computer forensics software.
Q. Does your current text neglect certain subject areas?
  • A: Computer Forensics: Principles and Practices covers three key areas—computer technology, recognized investigative techniques, and legal issues. Without an understanding of these three areas, mistakes will be made that could have alarming consequences. with or tainted.
Q. Do you want students to develop the necessary expertise, ethical responsibility, and diverse skill set of a computer forensics investigator?
  • A. Students learn the technical expertise needed to gather, filter, and authenticate e-evidence for use in court or legal actions with knowledge of relevant laws regarding civil rights, search warrants, and rules of evidence.
Other Points of Differentiation
  • Introduction to digital investigations with concepts, terminology and issues, in addition to practical skills in multiple types of computer, Internet, and digital device forensics.
    - Provides students with a strong foundation in electronic evidence collection and handling, chain of custody, documentation, testifying as an expert witness, and surviving harsh cross-examination.
  • Solid coverage of forensics tools, techniques, and environments plus rules of evidence and privacy rights
    -
    Provides students with a comprehensive analysis of the role of e-evidence in computer crimes, cyberterrorism, traditional and violent crimes, incident responses, civil cases, fraud and information security verification
  • Coverage of often neglected subject arease.g. PDA forensics, cell phone forensics, email and Internet forensics; tracking down hackers and serial killers.
    -
    Introduces students to important forensics investigative issues that are often     overlooked in other texts.
  • End-of-chapter exercises, projects, and review questions.
    - Enables students to apply their new knowledge and expertise.
  • Extensive extra features, practical applications and FYI’s throughout.
    - Provides students with practical knowledge to help them understand their technical role, legal obligations, and ethical responsibilities.
  • Technical, Investigative, and Legal Glossary and Appendices
    - Multiple appendices with additional resources, forms, and checklists to manage and document the case life cycle involving e-evidence.