Computer Forensics: Principles and Practices

Paperback
from $0.00

Author: Linda Volonino

ISBN-10: 0131547275

ISBN-13: 9780131547278

Category: Computer Crime

Master the techniques for gathering electronic evidence and explore the new frontier of crime investigation. \ The demand for computer forensics experts greatly exceeds the supply. With the rapid growth of technology in all parts of our lives, criminal activity must be tracked down and investigated using electronic methods that require up-to-date techniques and knowledge of the latest software tools. Authors Linda Volonino, Jana Godwin, and Reynaldo Anzaldua share their expertise to give you...

Search in google:

For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigationBy applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.

Contents in Brief PART ONE: Admissibility of Electronic Evidence ........................1 Forensic Evidence and Crime Investigation ......................................3 Computer Forensics and Digital Detective Work ..............................38 PART TWO: Preparing for E-Evidence Collectionand Preservation ....................................................................79 Tools, Environments, Equipment, and Certifications ..........................81 Policies and Procedures..............................................................120 Data, PDA, and Cell Phone Forensics ..........................................157 PART THREE: Forensic Examination of Computersand Digital and Electronic Media ......................................193 Operating Systems and Data Transmission Basics for Digital Investigations ............................................................................195 Investigating Windows, Linux, and Graphics Files ........................236 E-Mail and Webmail Forensics ....................................................282 PART FOUR: Detecting Intrusions, Malware, and Fraud ........317 Internet and Network Forensics and Intrusion Detection ..................319 Tracking Down Those Who Intend to Do Harm on a Large Scale ....348 Fraud and Forensic Accounting Investigation ................................372 PART FIVE: Legal, Ethical, and Testimony Topics....................405 Federal Rules and Criminal Codes ..............................................407 Ethical and Professional Responsibility in Testimony ......................436 Appendix A: Online Resources ....................................................467Appendix B: Government and Legal References ..............................472Appendix C: Sample Legal Forms, Letters, and Motions ....................478Appendix D: Summaries of Court Cases ........................................504Glossary ..................................................................................508References ................................................................................516Index ......................................................................................523