Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

"Computer Forensics: Computer Crime Scene Investigation" by John R. Vacca (Repost)

Posted By: exLib
"Computer Forensics: Computer Crime Scene Investigation" by John R. Vacca (Repost)

"Computer Forensics: Computer Crime Scene Investigation" by John R. Vacca
Networking Series
Charles River Media | 2005 | ISBN: 1584506377 1584503890 9781584503897 9781584506379 | 865 pages | PDF | 6 MB

This completely updated book provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals.

Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.
KEY FEATURES
• Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks
• Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter

Selected topics include:
Computer Forensics Fundamentals;
Data Recovery;
Evidence Collection and Data Seizure;
Computer Image Verifi cation;
Duplication and Preservation of Digital Evidence;
Electronic Evidence Reconstructing Past Events;
Deterrence through Attacker ID;
Destruction of e-mail;
Networks;
Protection against Random Terrorist Information Warfare Tactics;
The Cyber Foot Print and Criminal Tracking;
The Individual Exposed;
Advanced Encryption & Hacking;
Case Studies and Vignettes;
Evidence Checklists and Forms

Contents
Acknowledgments
Foreword
Introduction
Part I: Overview of Computer Forensics Technology
1 Computer Forensics Fundamentals
2 Types of Computer Forensics Technology
3 Types of Computer Forensics Systems
4 Vendor and Computer Forensics Sen/ices
Part II: Computer Forensics Evidence and Capture
5 Data Recovery
6 Evidence Collection and Data Seizure
7 Duplication and Preservation of Digital Evidence
8 Computer Image Verification and Authentication
Part III: Computer Forensics Analysis
9 Discovery of Electronic Evidence
10 Identification of Data
11 Reconstructing Past Events
12 Networks
Part IV: Countermeasures: Information Warfare
13 Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
14 The Information Warfare Arsenal and Tactics of the Military
15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
16 The Information Warfare Arsenal and Tactics of Private Companies
17 The Information Warfare Arsenal of the Future
18 Surveillance Tools for Information Warfare of the Future
19 Civilian Casualties: The Victims and Refugees of Information Warfare
Part V: Advanced Computer Forensics Systems and Future Directions
20 Advanced Computer Forensics
21 Summary, Conclusions, and Recommendations
Appendix A: Frequently Asked Questions
Appendix B: Computer Forensics Resources
Appendix C: Links to Computer Forensics and Related Law Enforcement Web Pages
Appendix D: More Computer Forensics Cases
Appendix E: Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter
Appendix F: Checklists by Chapter
Appendix G: About the CD-ROM
Appendix H: Glossary of Terms and Acronyms
with TOC BookMarkLinks