Narrow your search
Listing 1 - 10 of 17 << page
of 2
>>
Sort by
Digital evidence and computer crime : Forensic science, computers and the internet
Author:
ISBN: 012162885X Year: 2000 Publisher: New York, NY ; London : Academic Press,

Digital evidence and computer crime
Author:
ISBN: 0121631044 Year: 2004 Publisher: Amsterdam Boston Academic Press

Handbook of computer crime investigation : forensic tools and technology
Author:
ISBN: 1281053295 9786611053291 0080488900 9780080488905 0121631036 9781281053299 6611053298 Year: 2002 Publisher: San Diego, Calif. : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective compariso


Digital
Handbook of digital forensics and investigation
Author:
ISBN: 9780123742674 0123742676 1282618210 9781282618213 9780080921471 0080921477 Year: 2010 Publisher: London Academic

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds *Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms *Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations.

Keywords


Book
Digital evidence and computer crime : forensic science, computers and the internet
Author:
ISBN: 1280968273 9786610968275 0080472508 Year: 2004 Publisher: Amsterdam ; London : Elsevier Academic,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and an


Book
Handbook of digital forensics and investigation
Authors: --- ---
ISBN: 1784023353 1282618210 9786612618215 0080921477 0123742676 9780123742674 9781282618213 9780080921471 Year: 2010 Publisher: Burlington, Mass. : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This completely revised reference work will concentrate on providing specific practical information in a well organized format. Each chapter will have a consistent structure, covering similar aspects of different systems when appropriate. In order to provide readers with the knowledge they will need, and to create a thorough understanding of how to utilize the widest range of digital evidence in vastly varying situations, this work is divided into two parts: Investigative Methodology and Forensic Analysis. The Investigative Methodology section will provide guidance in how to conduct

Investigating child exploitation and pornography : the internet, the law and forensic science
Authors: ---
ISBN: 1281008133 9786611008130 008047876X 1417552654 9781417552658 9780080478760 0121631052 9780121631055 Year: 2005 Publisher: Amsterdam ; London : Elsevier/Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this pro


Book
Digital evidence and computer crime : forensic science, computers and the Internet
Authors: ---
ISBN: 9780123742681 Year: 2011 Publisher: Waltham, MA : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems
Authors: --- ---
ISBN: 012411489X 0124095070 9780124114890 9780124095076 Year: 2013 Publisher: Oxford, United Kingdom : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme


Book
Malware forensics : investigating and analyzing malicious code
Authors: --- ---
ISBN: 1281762954 9786611762957 0080560199 159749268X 9780080560199 9781597492683 9781281762955 6611762957 Year: 2008 Publisher: Burlington, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised

Listing 1 - 10 of 17 << page
of 2
>>
Sort by