Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition

Portada
CRC Press, 2010 M12 19 - 528 páginas
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities and how cyber forensics can uncover them.
 

Comentarios de la gente - Escribir un comentario

Crítica de los usuarios - Marcar como inadecuado

A novel book for beginers...must read..!!!!

Contenido

Chapter 1 Introduction
1
Chapter 2 Cyber Forensic Tools and Utilities
27
Chapter 3 Concealment Techniques
49
Model System Platforms
117
Operating Systems Network Traffic and Applications
143
Digital Forensic Laboratory Accreditation Standards
179
Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires
193
An Australian Perspective
231
Cyber Forensic Best Practcice Recommendations
375
Steganography Tools
381
Forensic ResourcesLiterature and Selected Readings
385
Forensic Online Resources
389
Locating Forensic Data in Windows Registries
395
Sedona Principles for Electronic Document Production
411
Recap Federal Rules of Civil Procedure Involving EDiscovery Amendments
413
Selected Acronyms
419

Chapter 9 Forensic Black Bag
241
Forensic Value and Corporate Exposure
255
Legal Considerations
267
Chapter 12 Cyber Forensics and the Changing Face of Investigating Criminal Behavior
297
Chapter 13 Electronically Stored Information and Cyber Forensics
311
Management Survey
331
Computer Forensic Forensic Web Sites
343
Cyber Crime and Forensic Organizations
345
Cyber Forensic Training Resources List
351
Pertinent Legistlation
355
Recommended Readings
357
Management Assessment 20 Questions
361
Flowchart for the Seizure of a Personal Digital Assistant
363
Additional Information Computer Hardware
365
Questions That Every Cyber Investigator Should Ask before during and after an Investigation
369
Generic Cellular Telephone Search Warrants
423
Generic Computer Search Warrant
427
Generic Affidavit for Search Warrant
433
Configuring the Investigators Forensic Analysis Machine
437
Generic Search Warrant
439
Statement of Underlying Facts and Circumtances
443
Generic State Court OrderSeizure of Electronic Hardware and Records
447
Consent to Search
453
Confidential Cyber Forensics Questionnaire
457
Forensic Case Study Files from the Field
459
Glossary of Terms
463
Index
483
Back cover
499
Derechos de autor

Otras ediciones - Ver todas

Términos y frases comunes

Pasajes populares

Página 477 - Relevant evidence" means evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it would be without the evidence.

Información bibliográfica