Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…
Table of contents Chapter 1: Introduction: The Problem at Hand Chapter 2: "Computer Crime" discussed Chapter 3: Preparing for prosecution and testifying Chapter 4: Cyber Investigative Roles Chapter 5: Incident Response: live forensics and investigrations Chapter 6: Legal issues of intercepting WIFI transmissions Chapter 7: Seizure of digital information Chapter 8: Conducting Cyber Inv…
Table of Contents Chapter 1: Cyberspace: The new frontier for policing? Abstract The Shape of the Challenge The Size of the Challenge The Response Conclusion Chapter 2: Definitions of Cyber Terrorism Abstract Introduction The Confusion About Cyber Terrorism Cyber Terrorism Definition Has Cyber Terrorism Ever Occurred? Conclusions …
Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…
Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…
Contents Chapter 1 Indroduction Chapter 2 Literature background on steganography Chapter 3 Research methodology Chapter 4 Steganography samples Chapter 5 Steganalysis approach for steganography detection Chapter 6 Metadata analysis approach for steganography detection Chapter 7 Conclusions Chapter 8 Recommendations for further work
Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…
Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…
Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…
1 Introduction 1 Jennifer Bayuk 2 The Complex World of Corporate CyberForensics Investigations 7 Gregory Leibolt 3 Investigating Large-Scale Data Breach Cases 29 J Andrew Valentine 4 Insider Threat Investigations 45 Shane Sims 5 Accounting Forensics 53 Tracy McBride 6 Analyzing Malicious Software 59 Lenny Zeltser 7 Network Packet Forensics 85 Eddie Schwartz 8 RAM and File …