Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…
Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…
Terdapat bibliografi dan indeks. Table of contents: 1 - Introduction 2 - Forensic Laboratory Accommodation 3 - Setting up the Forensic Laboratory 4 - The Forensic Laboratory Integrated Management System 5 - Risk Management 6 - Quality in the Forensic Laboratory 7 - IT Infrastructure 8 - Incident Response 9 - Case Processing 10 - Case Management 11 - Evidence Presentation 12 - Sec…
Table of Contents Chapter 1. Introduction Digital Evidence Collection Simple File Copying “Dead Box” Approaches “Live Box” Approaches Decision-Making FlowChart Preview/Triage SmartPhones and Cellular Devices Chapter 2. High Tech Interview Introduction The Main Goal of Questioning a Suspect The Line of Questions for Suspects Questions for Victims Questions for Network Adm…
Table of contents: Digital investigation foundations Computer foundations Hard disk data acquisition Volume analysis PC-based partitions Server-based partitions Multiple disk volumes File system analysis FAT concepts and analysis FAT data structures NTFS concepts NTFS analysis …
Table of contents: 1. Preface 2. Disclaimer 3. Author 4. The cell phone 5. Digital camera forensics 6. The PDAs and digital forensics 7. GPS devices 8. Corporate investigations on a netbook 9. Cell phone investigations by police 10. Recovering existing or deleted data from USB devices 11. Places to work at investigating mobile devices 12. References 13. …
Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…
Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…
Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…
Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…