Computer Crime Scene Forensics

ISBN-10: 1584500182
ISBN-13: 9781584500186
Edition: 2001
Authors: John Vacca
List price: $39.95
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Careers in Legal Assisting Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $39.95
Copyright year: 2001
Publisher: Charles River Media
Binding: Mixed Media
Pages: 731
Size: 6.50" wide x 9.25" long x 1.50" tall
Weight: 2.992
Language: English

Forewordp. xvii
Introductionp. xix
Overview of Computer Forensics Technologyp. 1
Computer Forensics Fundamentalsp. 4
What is Computer Forensics?p. 4
Use of Computer Forensics in Law Enforcementp. 5
Computer Forensics Assistance to Human Resources/Employment Proceedingsp. 5
Computer Forensics Servicesp. 6
Benefits of Professional Forensics Methodologyp. 13
Steps Taken by Computer Forensics Specialistsp. 14
Who Can Use Computer Forensic Evidence?p. 15
Case Historiesp. 21
Case Studiesp. 24
Summaryp. 25
Endnotesp. 30
Types of Computer Forensics Technologyp. 31
Types of Military Computer Forensic Technologyp. 32
Types of Law Enforcement Computer Forensic Technologyp. 34
Types of Business Computer Forensic Technologyp. 45
Summaryp. 48
Endnotesp. 54
Types of Vendor and Computer Forensics Servicesp. 55
Occurrence of Cyber Crimep. 56
Cyber Detectivesp. 57
Fighting Cyber Crime with Risk-Management Techniquesp. 58
Computer Forensics Investigative Servicesp. 64
Forensic Process Improvementp. 71
Course Contentp. 80
Case Historiesp. 85
Summaryp. 87
Endnotesp. 91
Computer Forensics Evidence and Capturep. 93
Data Recoveryp. 95
Data Recovery Definedp. 95
Data Back-Up and Recoveryp. 96
The Role of Back-Up in Data Recoveryp. 105
The Data-Recovery Solutionp. 108
Case Historiesp. 114
Summaryp. 117
Endnotesp. 120
Evidence Collection and Data Seizurep. 121
Why Collect Evidence?p. 121
Collection Optionsp. 122
Obstaclesp. 122
Types of Evidencep. 123
The Rules of Evidencep. 124
Volatile Evidencep. 127
General Procedurep. 128
Collection and Archivingp. 129
Methods of Collectionp. 130
Artifactsp. 130
Collection Stepsp. 131
Controlling Contamination: The Chain of Custodyp. 132
Summaryp. 139
Endnotesp. 142
Duplication and Preservation of Digital Evidencep. 143
Preserving the Digital Crime Scenep. 143
Computer Evidence Processing Stepsp. 146
Legal Aspects of Collecting and Preserving Computer Forensic Evidencep. 154
Summaryp. 159
Endnotesp. 162
Computer Image Verification and Authenticationp. 163
Special Needs of Evidential Authenticationp. 164
Practical Considerationp. 171
Practical Implementationp. 172
Summaryp. 176
Endnotesp. 180
Computer Forensics Analysisp. 181
Discovery of Electronic Evidencep. 183
Electronic Document Discovery: A Powerful New Litigation Toolp. 184
Summaryp. 187
Endnotesp. 190
Identification of Datap. 191
Time Travelp. 192
Forensic Identification and Analysis of Technical Surveillance Devicesp. 195
Summaryp. 204
Endnotesp. 207
Reconstructing Past Eventsp. 209
How to Become a Digital Detectivep. 210
Useable File Formatsp. 211
Unusable File Formatsp. 212
Converting Filesp. 212
Summaryp. 216
Endnotesp. 218
Networksp. 219
Network Forensics Scenariop. 220
A Technical Approachp. 220
Destruction of E-Mailp. 223
Damaging Computer Evidencep. 225
Documenting the Intrusion on Destruction of Datap. 228
System Testingp. 229
Summaryp. 231
Endnotesp. 236
Countermeasures: Information Warfarep. 237
Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groupsp. 239
Is the United States Government Prepared for Information Warfare?p. 239
Are Other Governments Prepared for Information Warfare?p. 243
What Industry Groups Have Done to Prepare for Information Warfare?p. 246
Strategic Diplomacy and Information Warfarep. 248
The Role of International Organizationsp. 259
The Role of the Global Military Alliancesp. 266
Marshall Law and Cyberspacep. 268
The Super Cyber Protection Agenciesp. 270
Summaryp. 273
Endnotesp. 278
The Information Warfare Arsenal and Tactics of the Militaryp. 279
Overview of Military Tacticsp. 285
Offensive Ruinous Information Warfare Tools and Tacticsp. 287
Offensive Containment Information Warfare Tools and Tacticsp. 289
Defensive Preventive Information Warfare Tools and Tacticsp. 293
Defensive Ruinous Information Warfare Tools and Tacticsp. 295
Defensive Responsive Containment Information Warfare Tools and Tacticsp. 296
Countering Sustained Terrorist Information Warfare Tacticsp. 300
Dealing with Random Terrorist Information Warfarep. 305
Summaryp. 319
Endnotesp. 323
The Information Warfare Arsenal and Tactics of Terrorist and Roguesp. 325
The Terrorist Profilep. 331
From Vietnam Marches to Cyberdisobediencep. 332
Grow Upp. 333
Why Terrorist and Rogues Have an Advantage in Iwp. 334
The Criminal Cafe in Cyberspacep. 344
The Super Computer Literate Terroristp. 349
The Brilliant and Nasty Roguep. 351
How They Watch and What They Knowp. 352
How and Where They Get Their Toolsp. 355
Why Tools are Easy to Get and Usep. 363
Why Nasty People are So Hard to Track Down and Capturep. 365
What They will do Next--the Information Warfare Gamesp. 371
Summaryp. 374
Endnotesp. 379
The Information Warfare Arsenal and Tactics of Private Companiesp. 381
Overview of Defensive Tactics Private Companies Can Takep. 385
Surviving Offensive Ruinous Information Warfarep. 389
Surviving Offensive Containment Information Warfarep. 391
Participating in Defensive Preventive Information Warfare Planningp. 392
Benefiting from and Surviving Defensive Ruinous Information Warfarep. 396
Benefiting from and Surviving Defensive Responsive Containment Information Warfarep. 398
Protection Against Random Terrorist Information Warfare Tacticsp. 402
What to do When Terrorists Keep Attackingp. 405
Countering Sustained Rogue Information Warfarep. 408
Protection Against Random Rogue Information Warfarep. 410
Keeping the Amateur Rogue Out of the Cyber Housep. 418
Summaryp. 419
Endnotesp. 423
Information Warfare Arsenal of the Futurep. 425
You Haven't Seen Anything Like What is Comingp. 427
New Toys for Big Brother and the Boysp. 442
Snoop, Sniff, and Snuff Toolsp. 447
Beware: E-Mail Wiretaps Like Carnivore Can Steal Sensitive Correspondencep. 451
Spy Dust Balls and Mechanical Dragonfliesp. 454
Nanotechnologyp. 459
Summaryp. 463
Endnotesp. 468
Surveillance Tools for Information Warfare of the Futurep. 469
Monitoring Everythingp. 469
Cyber Surveillancep. 472
The Cyber Footprint and Criminal Trackingp. 474
The Implications of Cookies and Integrated Platformsp. 486
Wintel Inside, or How Your Computer is Watching Youp. 488
Data Mining for What?p. 492
The Internet is Big Brotherp. 500
The Wireless Internet--Friend or Foe?p. 502
Summaryp. 503
Endnotesp. 506
Civilian Casualties--The Victims and Refugees of Information Warfarep. 507
What the Cyber Masses Have to Losep. 509
The Destruction of Personal Assets in Information Warsp. 520
The Violation of Privacy During Information Warsp. 526
The Individual Exposedp. 529
Uncovering Secret Identitiesp. 532
The Monitoring of Private Affairs in Cyber Spacep. 535
The New Order and State Medical Id Cardsp. 542
Big Brother is Here and is Stayingp. 546
Summaryp. 549
Endnotesp. 552
Results and Future Directionsp. 553
Advanced Computer Forensicsp. 555
Advanced Encryption: The Need to Concealp. 556
Advanced Hackingp. 568
Advanced Tracker Hackersp. 576
Source Addressesp. 580
The Problems of the Presentp. 594
The Outlook for the Futurep. 597
Summaryp. 598
Endnotesp. 603
Summary, Conclusions, and Recommendationsp. 605
Summaryp. 606
Conclusionsp. 615
Recommendationsp. 618
Final Word: Computer Forensic Needs and Challengesp. 636
Endnotesp. 638
Appendixesp. 639
Frequently Asked Questionsp. 641
Computer Forensics Resourcesp. 647
Links to Computer Forensics and Related Law Enforcement Web Pagesp. 651
More Computer Forensics Casesp. 657
On the CD-ROMp. 665
Glossaryp. 669
Indexp. 703
Table of Contents provided by Syndetics. All Rights Reserved.

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×