Computer Forensics For Dummies

Front Cover
John Wiley & Sons, Nov 24, 2008 - Computers - 400 pages
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.

You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to:

  • Prepare for and conduct computer forensics investigations
  • Find and filter data
  • Protect personal privacy
  • Transfer evidence without contaminating it
  • Anticipate legal loopholes and opponents’ methods
  • Handle passwords and encrypted data
  • Work with the courts and win the case

Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Introduction
1
Preparing to Crack the Case 71
4
Knowing What Your Digital Devices Create Capture
9
Suiting Up for a Lawsuit or Criminal Investigation
23
Getting Authorized to Search and Seize
39
Suiting Up for a Lawsuit or Criminal Investigation 23 Chapter 3 Getting Authorized to Search and Seize 39 Chapter 4 Documenting and Managing t...
55
Minding and Finding the Loopholes
73
Preparing to Crack the Case
74
Mobile Forensics
219
Network Forensics
241
Investigating XFiles eXotic Forensics
265
Succeeding in Court
275
Winning a Case Before You Go to Court
287
Winning a Case Before You Go to Court 287 Chapter 17 Standing Your Ground in Court
295
The Part of Tens
311
The Part of Tens
314

Acquiring and Authenticating EEvidence
95
Minding and Finding the Loopholes 73 Chapter 6 Acquiring and Authenticating EEvidence 95 Chapter 7 Examining EEvidence
117
Extracting Hidden Data
135
Doing Computer Forensic Investigations
151
EMail and Web Forensics 153 Chapter 10 Data Forensics
175
Document Forensics
201
and a Dangerous Expert Witness
319
Ten Cool Tools for Computer Forensics
325
Glossary
331
Index
345
Copyright

Other editions - View all

Common terms and phrases

About the author (2008)

Linda Volonino (PhD, MBA, CISSP, ACFE) is a computer forensic investigator and expert witness with Robson Forensic, Inc. and a member of InfraGard.

Reynaldo Anzaldua (MBA, CISSP, EnCE, CHFI, IBM I-Series) teaches computer forensics and information security at South Texas College and works with private organizations and government agencies.

Bibliographic information