Skip to content

Software Forensics Collecting Evidence from the Scene of a Digital Crime

Best in textbook rentals since 2012!

ISBN-10: 0071428046

ISBN-13: 9780071428040

Edition: 2004

Authors: Robert Slade

List price: $39.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

A technical tutorial, Robert Slade's book examines in depth the programming tools and investigative and analytic methods that are needed track down and bring to account electronic criminals based upon the evidence that's available at the scene of a digital or computer-related crime.
Customers also bought

Book details

List price: $39.95
Copyright year: 2004
Publisher: McGraw-Hill Professional Publishing
Publication date: 1/12/2004
Binding: Paperback
Pages: 215
Size: 7.00" wide x 8.75" long x 0.75" tall
Weight: 0.132
Language: English

Introductionp. xi
Introduction to Software Forensicsp. 1
Digital Forensic Definitionsp. 2
Software Forensicsp. 4
Objectives and Objects of Software Forensicsp. 5
Identityp. 6
Other Objects of Studyp. 11
Software Forensic Toolsp. 12
The Processp. 12
The Productsp. 14
Finally, Already, the Toolsp. 16
Software Forensic Technologies and Practicesp. 18
Content Analysisp. 18
Noncontent Analysisp. 19
Legal Considerationsp. 20
Presentation in Courtp. 21
Summaryp. 21
The Players--Hackers, Crackers, Phreaks, and Other Doodzp. 23
Terminologyp. 24
Types of Blackhatsp. 26
Motivations and Rationalesp. 29
General Characteristicsp. 35
Blackhat Productsp. 37
Other Productsp. 42
Summaryp. 43
Software Code and Analysis Toolsp. 45
The Programming Processp. 47
The Productsp. 51
The Resulting Objectsp. 52
The Analytical Toolsp. 53
Forensic Toolsp. 63
Summaryp. 64
Advanced Toolsp. 65
Decompilationp. 65
Desquirrp. 67
Dccp. 68
Boomerangp. 68
Plagiarismp. 68
JPlagp. 69
YAPp. 70
Other Approachesp. 71
Summaryp. 76
Law and Ethics--Software Forensics in Courtp. 77
Legal Systemsp. 77
Differences within Common Lawp. 78
Jurisdictionp. 79
Evidencep. 80
Types of Evidencep. 80
Rules of Evidencep. 81
Providing Expert Testimonyp. 84
Ethicsp. 87
Disclosurep. 88
Blackhat Motivations as a Defensep. 89
Summaryp. 90
Computer Virus and Malware Concepts and Backgroundp. 91
History of Computer Viruses and Wormsp. 91
Malware Definition and Structurep. 95
Virus Structurep. 98
Worm Structurep. 100
Trojan Structurep. 101
Logic Bomb Structurep. 103
Remote Access Trojan (RAT) Structurep. 103
Distributed Denial of Service (DDoS) Structurep. 104
Detection and Antidetection Techniquesp. 104
Detection Technologiesp. 106
Stealth and Antidetection Measuresp. 111
Summaryp. 112
Programming Cultures and Indicatorsp. 113
User Interfacep. 113
Cultural Features and "Help"p. 116
Functionsp. 120
Programming Stylep. 122
Program Structurep. 122
Programmer Skill and Objectivesp. 124
Developmental Stricturesp. 126
Technological Changep. 127
Summaryp. 127
Stylistic Analysis and Linguistic Forensicsp. 129
Biblical Criticismp. 130
Shakespeare and Other Literaturep. 131
Individual Identification and Authenticationp. 134
Content Analysisp. 137
Noncontent Analysisp. 139
The Content/Noncontent Debatep. 144
Noncontent Metrics as Evidence of Authorshipp. 145
Additional Indicatorsp. 146
Summaryp. 146
Authorship Analysisp. 147
Problemsp. 147
Plagiarism Detection versus Authorship Analysisp. 148
How Can It Work?p. 150
Source Code Indicatorsp. 150
More General Indicatorsp. 151
Is It Reliable?p. 152
Summaryp. 153
References and Resourcesp. 155
Introduction and Backgroundp. 156
Blackhatsp. 166
Toolsp. 174
Advanced Toolsp. 190
Law and Ethicsp. 190
Viruses and Malwarep. 196
Stylistic Analysis and Linguistic Forensicsp. 201
Software Authorship Analysisp. 202
Indexp. 205
Table of Contents provided by Ingram. All Rights Reserved.