gogogo
Syndetics cover image
Image from Syndetics

Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler.

By: Contributor(s): Material type: TextTextSeries: Security series (Upper Saddle River, N.J.)Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007.Edition: 1st edDescription: xviii, 534 p. : ill. ; 24 cmISBN:
  • 9780131547278 (alk. paper)
  • 0131547275 (alk. paper)
Subject(s):
Contents:
Admissibility of electronic evidence. Forensic evidence and crime investigation ; Computer forensics and digital detective work -- Preparing for E-evidence collection and preservation. Tools, environents, equipment, and certifications ; Policies and procedures ; Data, PDA, and cell phone forensics -- Forensic examination of computers and digital and electronic media. Operating systems and data transmission basics for digital investigations ; Investigating Windows, Linux, and graphics files ; E-mail and Webmail forensics -- Detecting intrusions, malware, and fraud. Internet and network forensics and intrusion detection ; Tracking down those who intend to do harm on a large scale ; Fraud and forensic accounting investigations -- Legal, ethical, and testimony topics. Federal rules and criminal codes ; Ethical and professional responsibility in testimony -- Appendix a: online resources -- Appendix b: government and legal references -- Appendix c: sample legal forms, letters, and motions -- Appendix d: summaries of court cases -- Glossary.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Thurles Library Main Collection 005.8 VOL (Browse shelf(Opens below)) 1 Available R11330KRCC

Enhanced descriptions from Syndetics:

For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation

 

By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.   

Includes bibliographical references (p. 516-522) and index.

Admissibility of electronic evidence. Forensic evidence and crime investigation ; Computer forensics and digital detective work -- Preparing for E-evidence collection and preservation. Tools, environents, equipment, and certifications ; Policies and procedures ; Data, PDA, and cell phone forensics -- Forensic examination of computers and digital and electronic media. Operating systems and data transmission basics for digital investigations ; Investigating Windows, Linux, and graphics files ; E-mail and Webmail forensics -- Detecting intrusions, malware, and fraud. Internet and network forensics and intrusion detection ; Tracking down those who intend to do harm on a large scale ; Fraud and forensic accounting investigations -- Legal, ethical, and testimony topics. Federal rules and criminal codes ; Ethical and professional responsibility in testimony -- Appendix a: online resources -- Appendix b: government and legal references -- Appendix c: sample legal forms, letters, and motions -- Appendix d: summaries of court cases -- Glossary.

Table of contents provided by Syndetics

  • Security Series Walk-Through (p. x)
  • Preface (p. xii)
  • About the Authors (p. xvii)
  • Acknowledgments (p. xviii)
  • Quality Assurance (p. xviii)
  • Part 1 Admissibility of Electronic Evidence (p. 1)
  • Chapter 1 Forensic Evidence and Crime Investigation (p. 3)
  • Basics of Crimes (p. 4)
  • Information Warfare, Electronic Attack, and Terrorism (p. 10)
  • Computer Forensics Evidence and Investigations (p. 12)
  • Electronic Evidence: Technology and Legal Issues (p. 19)
  • Computer Forensics: A Growing Field and Practice Area (p. 22)
  • Discovery (p. 25)
  • Electronic Discovery (E-Discovery) (p. 27)
  • Summary (p. 31)
  • Test Your Skills (p. 31)
  • Chapter 2 Computer Forensics and Digital Detective Work (p. 38)
  • The Role of E-Evidence in Solving Physical and Computer Crimes (p. 39)
  • Computer Forensics Science (p. 43)
  • Digital Signatures and Profiling (p. 46)
  • Computer Forensics and the E-Evidence Collection Process (p. 48)
  • Suppression, Probable Cause, and Search Warrants (p. 53)
  • Types of Motives and Cybercrimes (p. 60)
  • Forensics Rules and Evidence Issues (p. 67)
  • Computer Forensics Investigator's Responsibilities (p. 70)
  • Summary (p. 70)
  • Test Your Skills (p. 71)
  • Part 2 Preparing for E-Evidence Collection and Preservation (p. 79)
  • Chapter 3 Tools, Environments, Equipment, and Certifications (p. 81)
  • Managing the Life-Cycle of a Case (p. 82)
  • Acquiring and Authenticating the E-Evidence (p. 85)
  • Searching and Analyzing the Data (p. 91)
  • Investigative Environments and Analysis Modes (p. 95)
  • Forensic Tools and Toolkits (p. 96)
  • Forensics Equipment (p. 106)
  • Certification and Training Programs (p. 110)
  • Summary (p. 111)
  • Test Your Skills (p. 112)
  • Chapter 4 Policies and Procedures (p. 120)
  • Reasons for Policies and Procedures (p. 121)
  • Precase Preparations (p. 123)
  • Steps in the Forensic Examination (p. 128)
  • Examining the Evidence (p. 138)
  • The Art of Forensics: Analyzing the Data (p. 143)
  • Reporting on the Investigation (p. 148)
  • Summary (p. 151)
  • Test Your Skills (p. 152)
  • Chapter 5 Data, PDA, and Cell Phone Forensics (p. 157)
  • Basic Hard Drive Technology (p. 158)
  • Other Storage Technologies (p. 161)
  • Personal Digital Assistant Devices (PDAs) (p. 165)
  • Cellular Phones (p. 166)
  • Drive and Media Analysis (p. 167)
  • PDA Analysis (p. 173)
  • Cellular Phone Analysis (p. 175)
  • Disk Image Forensic Tools (p. 178)
  • PDA/Cellular Phone Forensic Software (p. 180)
  • Summary (p. 187)
  • Test Your Skills (p. 188)
  • Part 3 Forensic Examination of Computers and Digital and Electronic Media (p. 193)
  • Chapter 6 Operating Systems and Data Transmission Basics for Digital Investigations (p. 195)
  • What Is an Operating System? (p. 196)
  • Major Components of an Operating System (p. 197)
  • Common Operating Systems (p. 201)
  • Common File System Types (p. 216)
  • OSI and TCP/IP Models (p. 221)
  • Summary (p. 229)
  • Test Your Skills (p. 229)
  • Chapter 7 Investigating Windows, Linux, and Graphics Files (p. 236)
  • Investigating Windows Systems (p. 237)
  • Finding User Data and Profiles in Windows Folders (p. 240)
  • Investigating System Artifacts (p. 247)
  • Investigating Linux Systems (p. 254)
  • Graphic File Forensics (p. 262)
  • Summary (p. 267)
  • Test Your Skills (p. 267)
  • Chapter 8 E-Mail and Webmail Forensics (p. 282)
  • Importance of E-Mail as Evidence (p. 283)
  • Working with E-Mail (p. 284)
  • Working with Webmail (p. 290)
  • Working with Mail Servers (p. 293)
  • Examining E-Mails for Evidence (p. 296)
  • Working with Instant Messaging (p. 304)
  • Summary (p. 306)
  • Test Your Skills (p. 307)
  • Part 4 Detecting Intrusions, Malware, and Fraud (p. 317)
  • Chapter 9 Internet and Network Forensics and Intrusion Detection (p. 319)
  • An Introduction to Network Forensics and Intrusion Detection (p. 320)
  • Data Sources on a Network (p. 326)
  • Physical Aspects of Capturing Data (p. 331)
  • Logical Aspects of Capturing Data (p. 332)
  • Examining Data (p. 333)
  • NFAT Software Tools (p. 338)
  • Summary (p. 342)
  • Test Your Skills (p. 342)
  • Chapter 10 Tracking Down Those Who Intend to Do Harm on a Large Scale (p. 348)
  • Large-Scale Investigations (p. 349)
  • Terrorism, Virtual Warfare, and Other Types of Internet-Based Hostilities (p. 351)
  • Botnets and Criminal Commerce (p. 358)
  • Tracking Criminals' Trails (p. 361)
  • Summary (p. 364)
  • Test Your Skills (p. 364)
  • Chapter 11 Fraud and Forensic Accounting Investigation (p. 372)
  • Challenges of Fraud Investigations (p. 373)
  • Types of Fraud (p. 382)
  • Characteristics and Symptoms of Fraud (p. 390)
  • Fraud Investigation and Deterrence (p. 392)
  • Digital Forensic Accounting (p. 394)
  • Summary (p. 397)
  • Test Your Skills (p. 398)
  • Part 5 Legal, Ethical, and Testimony Topics (p. 405)
  • Chapter 12 Federal Rules and Criminal Codes (p. 407)
  • Due Process of the Law (p. 408)
  • Anticrime Laws (p. 417)
  • Summary (p. 429)
  • Test Your Skills (p. 429)
  • Chapter 13 Ethical and Professional Responsibility in Testimony (p. 436)
  • The Importance of Forensic Expert Witnesses and Expert Reports (p. 437)
  • The Trial Process (p. 443)
  • Guidelines for Testifying (p. 450)
  • Professional and Educational Resources (p. 458)
  • Summary (p. 459)
  • Test Your Skills (p. 460)
  • Appendix A Online Resources (p. 467)
  • Appendix B Government and Legal References (p. 472)
  • Appendix C Sample Legal Forms, Letters, and Motions (p. 478)
  • Appendix D Summaries of Court Cases (p. 504)
  • Glossary (p. 508)
  • References (p. 516)
  • Index (p. 523)

Powered by Koha