gogogo
Syndetics cover image
Image from Syndetics

Digital evidence and computer crime : forensic science, computers and the Internet / by Eoghan Casey ; with contributions from Robert Dunne ... [et al.].

By: Material type: TextTextPublication details: London ; San Diego, Calif. : Academic Press, 2004.Edition: 2nd edDescription: xviii, 690 p. : ill. ; 26 cmISBN:
  • 0121631044 (alk. paper)
Subject(s): DDC classification:
  • 363.25 CAS
Online resources:
Contents:
Digital evidence and computer crime -- History and terminology of computer crime investigation -- Technology and law -- The investigative process -- Investigative reconstruction -- Modus operandi, motive and technology -- Digital evidence in the courtroom -- Computer basics for digital investigators -- Applying forensic science to computers -- Forensic examination of Windows systems -- Forensic examination of Unix systems -- Forensic examination of Macintosh systems -- Forensic examination of handheld devices -- Network basics for digital investigators -- Applying forensic science to networks -- Digital evidence on physical and data-link layers -- Digital evidence at the network and transport layers -- Digital evidence on the Internet -- Investigating computer intrusions -- Sex offenders on the Internet -- Investigations cyberstalking -- Digital evidence as alibi -- Digital evidence handling guidelines -- Digital evidence examination guidelines.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 363.25 CAS (Browse shelf(Opens below)) 1 Available 39002100310532
Standard Loan Moylish Library Main Collection 363.25 CAS (Browse shelf(Opens below)) 2 Available 39002100387076

Enhanced descriptions from Syndetics:

Digital Evidence and Computer Crime, Second Edition, is a hands-on resource that aims to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This textbook explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence.

In addition to gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, students will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive unlimited access to the author's accompanying website, which contains simulated cases that integrate many of the topics covered in the text.

This text is required reading for anyone involved in computer investigations or computer administration, including computer forensic consultants, law enforcement, computer security professionals, government agencies (IRS, FBI, CIA, Dept. of Justice), fraud examiners, system administrators, and lawyers.

Includes bibliographical references (p. [645]-663) and indexes.

Digital evidence and computer crime -- History and terminology of computer crime investigation -- Technology and law -- The investigative process -- Investigative reconstruction -- Modus operandi, motive and technology -- Digital evidence in the courtroom -- Computer basics for digital investigators -- Applying forensic science to computers -- Forensic examination of Windows systems -- Forensic examination of Unix systems -- Forensic examination of Macintosh systems -- Forensic examination of handheld devices -- Network basics for digital investigators -- Applying forensic science to networks -- Digital evidence on physical and data-link layers -- Digital evidence at the network and transport layers -- Digital evidence on the Internet -- Investigating computer intrusions -- Sex offenders on the Internet -- Investigations cyberstalking -- Digital evidence as alibi -- Digital evidence handling guidelines -- Digital evidence examination guidelines.

Table of contents provided by Syndetics

  • Acknowledgments (p. vii)
  • Detailed Table of Contents (p. ix)
  • Author Biographies (p. xvii)
  • Introduction (p. 1)
  • Part 1 Digital Investigation (p. 7)
  • Chapter 1 Digital Evidence and Computer Crime (p. 9)
  • Chapter 2 History and Terminology of Computer Crime Investigation (p. 25)
  • Chapter 3 Technology and Law (p. 41)
  • Chapter 4 The Investigative Process (p. 91)
  • Chapter 5 Investigative Reconstruction (p. 115)
  • Chapter 6 Modus Operandi, Motive, and Technology (p. 147)
  • Chapter 7 Digital Evidence in the Courtroom (p. 169)
  • Part 2 Computers (p. 191)
  • Chapter 8 Computer Basics for Digital Investigators (p. 193)
  • Chapter 9 Applying Forensic Science to Computers (p. 211)
  • Chapter 10 Forensic Examination of Windows Systems (p. 255)
  • Chapter 11 Forensic Examination of Unix Systems (p. 289)
  • Chapter 12 Forensic Examination of Macintosh Systems (p. 323)
  • Chapter 13 Forensic Examination of Handheld Devices (p. 337)
  • Part 3 Networks (p. 357)
  • Chapter 14 Network Basics for Digital Investigators (p. 359)
  • Chapter 15 Applying Forensic Science to Networks (p. 383)
  • Chapter 16 Digital Evidence on Physical and Data-Link Layers (p. 419)
  • Chapter 17 Digital Evidence on Network and Transport Layers (p. 441)
  • Chapter 18 Digital Evidence on the Internet (p. 477)
  • Part 4 Investigating Computer Crime (p. 519)
  • Chapter 19 Investigating Computer Intrusions (p. 521)
  • Chapter 20 Sex Offenders on the Internet (p. 561)
  • Chapter 21 Investigations Cyberstalking (p. 601)
  • Chapter 22 Digital Evidence as Alibi (p. 617)
  • Part 5 Guidelines (p. 625)
  • Chapter 23 Handling the Digital Crime Scene (p. 627)
  • Chapter 24 Digital Evidence Examination Guidelines (p. 633)
  • Bibliography (p. 645)
  • Glossary (p. 665)
  • Author Index (p. 675)
  • Subject Index (p. 677)

Author notes provided by Syndetics

Eoghan Casey is a computer security and computer crime consultant based in Baltimore, MD. He was previously a System Security Administrator for Yale University, and has received his B.A. in Mechanical Engineering from University of California, Berkeley and an M.A. in Educational Communication and Technology from New York University. He is a frequent lecturer on computer security, incident response, and digital investigation

Powered by Koha