EVERYDAY FREE SHIPPING on $25 & up - Excludes marketplace items & rentals.
EVERYDAY FREE SHIPPING on $25 & up - Excludes marketplace items & rentals.
EVERYDAY FREE SHIPPING on $25 & up - Excludes marketplace items & rentals
Search
Computer Forensics : Computer Science Investigation - With CD

Computer Forensics : Computer Science Investigation - With CD - 2nd edition

ISBN13: 978-1584503897

Cover of Computer Forensics : Computer Science Investigation - With CD 2ND 05 (ISBN 978-1584503897)
ISBN13: 978-1584503897
ISBN10: 1584503890
Cover type: Paperback
Edition/Copyright: 2ND 05
Publisher: Charles River Media, Inc.
Published: 2005
International: No

List price: $50.00

new
Sold Out
FREE Shipping on $25+
  • Check back soon!
  • 30-Day Returns
  • Condition: New
Sold Out

Computer Forensics : Computer Science Investigation - With CD - 2ND 05 edition

ISBN13: 978-1584503897

John R. Vacca

ISBN13: 978-1584503897
ISBN10: 1584503890
Cover type: Paperback
Edition/Copyright: 2ND 05
Publisher: Charles River Media, Inc.

Published: 2005
International: No
Summary

Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.

Benefits:

  • Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks
  • Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter
  • CD includes tools, presentations, and demos of the latest computer forensics software
  • Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verifi cation; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms

Table of Contents

Introduction

Part I Overview of Computer Forensics Technology

Chapter 1 Computer Forensics Fundamentals
Chapter 2 Types of Computer Forensics Technology
Chapter 3 Types of Computer Forensics Systems
Chapter 4 Vendor and Computer Forensics Services

Part II Computer Forensics Evidence and Capture

Chapter 5 Data Recovery
Chapter 6 Evidence Collection and Data Seizure
Chapter 7 Duplication and Preservation of Digital Evidence
Chapter 8 Computer Image Verification and Authentication

Part III Computer Forensics Analysis

Chapter 9 Discovery of Electronic Evidence
Chapter 10 Identification of Data
Chapter 11 Reconstructing Past Events
Chapter 12 Networks

Part IV Countermeasures: Information Warfare

Chapter 13 Fighting Against Macro Threats: Defensive Strategies
Chapter 14 The Information Warfare Arsenal and Tactics of the Military
Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies
Chapter 17 The Information Warfare Arsenal of the Future
Chapter 18 Surveillance Tools for Information Warfare of the Future
Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare

Part V Advanced Computer Forensics Systems and Future Directions

Chapter 20 Advanced Computer Forensics
Chapter 21 Summary, Conclusions, and Recommendations

Appendix A Frequently Asked Questions
Appendix B Computer Forensics Resources
Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages
Appendix D More Computer Forensics Cases
Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter
Appendix F Checklists by Chapter
Appendix G About the CD-ROM
Appendix H Glossary of Terms and Acronyms
Index