Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Computer Crime Investigation: Forensic Tools & Technology

Buy
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey has brought together an expert panel of authors to create this detailed guide for professionals who are already familiar with digital evidence. This unique handbook explains how to locate an utilize evidence in computer hard drives, shared networks, wireless devices, or embedded systems. The use of currently available high-tech tools is discussed and real case examples are provided.

To provide individuals with a deeper understanding of the forensic analysis of computer systems, three primary themes are treated:

Tools: Software and hardware for collecting and analyzing digital evidence are presented and their strengths and limitations are discussed. The section provides details on leading hardware and software programs-such as EnCase, Dragon, and ForensiX-with each chapter written by that product's creator.

Technology: This section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, and Windows and Unix operating systems, progressing to network, wireless and embedded systems.

Case examples: These actual situations demonstrate the technical, legal, and practical challenges that arise in real computer investigations.

The Handbook of Computer Crime Investigation is an essential technical reference and on-the-job guide for professionals in computing, security and investigation, forensic science, legal and law enforcement communities.

About the Author

Eoghan Casey is currently a computer security and computer crime consultant based in Baltimor, MD, USA. He was previously System Security Administrator for Yale University, and has received is B.A. in Mechanical Engineering from University of California, Berkeley and M.A. in Educational Communication and Technology from New York University. He is a frequent lecturer on computer security and computer crime and had contributed to the Encyclopedia of Forensic Science (Academic Press, December 2000), Criminal Profiling, 2E by Brent Turvey (Academic Press, May 2002), and written the Digital Evidence (Academic Press) and served as editor for the Handbook of Computer Crime Investigation (Academic Press).
(HTML tags aren't allowed.)

Digital Alias-free Signal Processing
Digital Alias-free Signal Processing
The rationale of replacing signal analog processing by digital, worth doing whenever it is feasible, is well known. The benefits that can be obtained are usually significant. Digital signal processing (DSP) technology is widely used in the application range characterized by relatively low frequencies and other acceptable...
DSP for In-Vehicle and Mobile Systems
DSP for In-Vehicle and Mobile Systems
DSP for In-Vehicle and Mobile Systems is focused on digital signal processing strategies for improving information access, command and control, and communications for in-vehicle environments. It is expected that the next generation of human-to-vehicle interfaces will incorporate speech, video/image, and wireless communication modalities to provide...
A Basic English Grammar
A Basic English Grammar
Grammar reference in a clear, handy format.

A large-format book containing all the grammar from "A Basic English Grammar", and most of the exercises from "BEG: Exercises" together with some new ones, all integrated into the relevant grammar sections. The book has a key and is designed for self-study, resource centres
...

Passive Components for Circuit Design
Passive Components for Circuit Design

Despite the very considerable increase in the use of ICs over the past ten years, passive components are still the mainstay of the electronics industry. The strong emphasis that is given to semiconductors, and ICs in particular, in teaching courses at all levels, however, causes the subject of passive components to be neglected, and many...

Traffic Engineering with MPLS
Traffic Engineering with MPLS

Design, configure, and manage MPLS TE to optimize network performance.

Almost every busy network backbone has some congested links while others remain underutilized. That's because shortest-path routing protocols send traffic down the path that is shortest without considering other network parameters,...

The Basics of S-PLUS (Statistics and Computing)
The Basics of S-PLUS (Statistics and Computing)

Proven bestseller: almost 6000 copies sold in the U.S. in two editions

New edition updated to cover S-PLUS 6.0

Can be used as an introduction to R, as well as S-PLUS

New exercises have been added; Includes a comparison of S-PLUS and R

Well-suited for self-study

...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy