Computer Forensics

Computer Forensics: Evidence Collection and Management

Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
$99.95
ISBN 9780849305610
Cat# AU0561
Add to cart
eBook (VitalSource)
$99.95 $69.97
ISBN 9780849305627
Cat# AUE0561
Add to cart
SAVE 30%
eBook Rentals
 

Features

  • Presents more than 200 key terms throughout the book, with definitions supplied in the Glossary
  • Provides two sets of forms: the first for guiding the reader through a forensic investigation and the second for guiding the reader through the procedures used in computer forensic laboratories
  • Contains a selected bibliography that lists a number of resources beneficial to the forensic professional

Summary

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.

The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on  investigations involving computer systems, e-mail, and wireless devices.

Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.

Table of Contents


COMPUTER FORENSIC INVESTIGATION BASICS
Computer Forensic Investigation Basics
Chapter Objectives
Introduction
Forensics Defined
The Four-Step Process
Chapter Summary
Terms
Review Questions
Policies, Standards, Laws, and Legal Processes
Chapter Objectives
Introduction
Laws and Legal Issues
Chapter Summary
Terms
Review Questions
Electronic Forensic Examination Categories
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
Computer, Internet, and Electronic Crimes
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
 
Computers, Electronics, and Networking Environment
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
Investigative Tools, Technical Training, and Forensic Equipment
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
FORENSIC EVIDENCE COLLECTION AND MANAGEMENT
Managing the Crime/Incident Scene
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
 
Investigating Computer Center Incidents
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
Computer Systems Disk and File Structures
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
The Computer and Electronic Forensic Lab
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
Extracting Computer and Electronic Evidence
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
E-mail and Internet Investigations
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
Mobile Phone and PDA Investigations
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
Court Preparation, Presentations, and Testimony
Chapter Objectives
Introduction
Chapter Summary
Terms
Review Questions
Appendix A
Investigation Forms
Examination Forms
Appendix B
Forensic Cases and Exercises
Appendix C
Answers to Review Questions
Appendix D
Binary and Hexadecimal Number Systems

Editorial Reviews

". . . provides a coherent, systematic, and comprehensive analytical study of cybercrime, E-commerce, and Internet activities that could be used to exploit the Internet, the customers, and the various electronic devices employed by individuals, by government agencies, and by corporations . . . the ideal textbook for college level computer science and information technology courses, as well as non-special general readers with an interest in the subject."

– In Midwest Book Review, August 2007

 

“… is intended to five computer users in the business, government, and education communities, a basic technical competency in computer forensics, which essentially involves the identification, retrieval, and protection of electronic evidence found on computers for litigation and prosecution. Topics addressed in the first section include investigation basics, policies, standards, laws, and legal processes; types of crimes and incidents involved in computer forensics; the computing environment ant types of evidence; and investigative tools, technical training, and forensic equipment. The second half of the text focuses on evidence collection and management and includes chapters on managing the crime/incident scene, investigating computer center incidents, computer systems disks and the file structures, the computer and electronic forensic lab, extracting computer and electronic evidence, e-mail and Internet investigations, mobile phone and PDA investigations, and court presentations and testimony. Where the topics are nation-specific (laws, regulations, and such), the material is geared towards a US readership.”
— In Book News Inc., June 2007

Recommended For You

 
 
Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us