Description |
xxiii, 318 pages ; 23 cm |
|
text rdacontent |
|
unmediated rdamedia |
|
volume rdacarrier |
Contents |
Part I. Getting started -- What is computer forensics? -- Learning computer forensics -- Creating a lab -- Part II. Your first investigation -- How to approach a computer forensics investigation -- Choosing your procedures -- Testing your tools -- Live vs. postmortem forensics -- Capturing evidence -- Nontraditional digital forensics -- Part III. Case examples : how to work a case -- Establishing the investigation type and criteria -- Human resources cases -- Administrator abuse -- Stealing information -- Internal leaks -- Keyloggers and malware -- Part IV. Defending your work -- Documenting your findings with reports -- Litigation and reports for court and exhibits. |
Summary |
"You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource."--Back cover. |
Subject |
Computer crimes -- Investigation.
|
|
Computer security.
|
|
Forensic sciences.
|
ISBN |
9780071742450 (alk. paper) |
|
007174245X (alk. paper) |
|