Handbook of Digital Forensics and Investigation

Nonfiction, Computers, Advanced Computing, Information Technology, Networking & Communications, Computer Security, Social & Cultural Studies, Social Science
Cover of the book Handbook of Digital Forensics and Investigation by Eoghan Casey, BS, MA, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Eoghan Casey, BS, MA ISBN: 9780080921471
Publisher: Elsevier Science Publication: October 7, 2009
Imprint: Academic Press Language: English
Author: Eoghan Casey, BS, MA
ISBN: 9780080921471
Publisher: Elsevier Science
Publication: October 7, 2009
Imprint: Academic Press
Language: English

Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime.

This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology).

This handbook is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind.

*Provides methodologies proven in practice for conducting digital investigations of all kinds
*Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations
*Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms
*Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime.

This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology).

This handbook is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind.

*Provides methodologies proven in practice for conducting digital investigations of all kinds
*Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations
*Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms
*Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations

More books from Elsevier Science

Cover of the book Biomaterials and Medical Device - Associated Infections by Eoghan Casey, BS, MA
Cover of the book Implementing Automated Road Transport Systems in Urban Settings by Eoghan Casey, BS, MA
Cover of the book Energetic Materials by Eoghan Casey, BS, MA
Cover of the book Exergy Analysis of Heating, Refrigerating and Air Conditioning by Eoghan Casey, BS, MA
Cover of the book Innovative Jacquard Textile Design Using Digital Technologies by Eoghan Casey, BS, MA
Cover of the book Advances in Applied Microbiology by Eoghan Casey, BS, MA
Cover of the book Microsomes, Drug Oxidations and Chemical Carcinogenesis V1 by Eoghan Casey, BS, MA
Cover of the book The Science of Grapevines by Eoghan Casey, BS, MA
Cover of the book Effects of Resource Distribution on Animal Plant Interactions by Eoghan Casey, BS, MA
Cover of the book Fundamental Principles of Engineering Nanometrology by Eoghan Casey, BS, MA
Cover of the book Categorical Variables in Developmental Research by Eoghan Casey, BS, MA
Cover of the book Handbook of Antimicrobial Coatings by Eoghan Casey, BS, MA
Cover of the book Mission-Critical Microsoft Exchange 2000 by Eoghan Casey, BS, MA
Cover of the book Soil Nematodes of Grasslands in Northern China by Eoghan Casey, BS, MA
Cover of the book Introductory Differential Equations by Eoghan Casey, BS, MA
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy