Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Albert Marcella, Jr., Robert S. Greenfield
CRC Press, Jan 23, 2002 - Computers - 464 pages
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a comprehensive, highly usable, and clearly organized resource to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology.
Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. The field bible for infosecurity professionals, this book introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.
You will understand how to:
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look under the hood and behind closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Tracing Activity on a WindowsBased Desktop
What is Possible and Where to Look Under the Hood
Automated Tools Used to Secure a System Throughout the Stages of a Forensic Investigation
Chapter 6 Network Intrusion Management and Profiling
Chapter 7 Cyber Forensics and the Legal System
FEDERAL AND INTERNATIONAL GUIDELINES
Chapter 8 Searching and Seizing Computers and Obtaining Electronic Evidence
A Guide for Federal Agencies
Chapter 15 Encryption
Chapter 16 Intellectual Property
Chapter 17 Forensic and Security Assessment Tools
Chapter 18 How to Report InternetRelated Crime
An Auditors Basic Checklist
Chapter 9 Computer Crime Policy and Programs
Chapter 10 International Aspects of Computer Crime
Chapter 11 Privacy Issues in the HighTech Context
Chapter 12 Critical Infrstructure Protection
Other editions - View all
activity Administration agency agency’s Amendment analysis application attacks Attorney audit authority backup browser business records exception cache child pornography communications computer crime computer evidence computer forensic computer records conduct contract cookies Coordinator court criminal critical infrastructure cyber cybercrime Department of Justice develop digital evidence disk document e-mail E-SIGN electronic commerce electronic processes electronic records electronic signatures encryption encryption products ensure examination example Exhibit federal files firewall forensic science Fourth Amendment fraud GPEA hacker identify individual Infrastructure Protection Intellectual Property Internet intrusion investigation involved jurisdiction law enforcement litigation logs Microsoft monitoring National NIPC Nmap operating system parties password person plaintext private sector procedures prosecute public safety regulations requirements risk Section server Sneak’s specific standards statute storage stored technical transactions United Windows Windows 95 Windows NT
Internet Child Pornography and the Law: National and International Responses
Dr Yaman Akdeniz
No preview available - 2013
All Book Search results »
Computational Science and Its Applications -- ICCSA 2004: International ...
No preview available - 2004