CART

(0) items

Computer Forensics : Principles and Practices,9780131547278
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Computer Forensics : Principles and Practices

by ; ;
Edition:
1st
ISBN13:

9780131547278

ISBN10:
0131547275
Format:
Paperback
Pub. Date:
8/21/2006
Publisher(s):
Prentice Hall
List Price: $135.80

Rent Textbook

(Recommended)
 
Term
Due
Price
$67.90

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
$132.41

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $32.81

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 1st edition with a publication date of 8/21/2006.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Summary

For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence(e-evidence) with coverage ofcomputer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.

Table of Contents

Security Series Walk-Through x
Preface xii
About the Authors xvii
Acknowledgments xviii
Quality Assurance xviii
PART ONE Admissibility of Electronic Evidence
1(78)
Forensic Evidence and Crime Investigation
3(35)
Basics of Crimes
4(6)
Information Warfare, Electronic Attack, and Terrorism
10(2)
Computer Forensics Evidence and Investigations
12(7)
Electronic Evidence: Technology and Legal Issues
19(3)
Computer Forensics: A Growing Field and Practice Area
22(3)
Discovery
25(2)
Electronic Discovery (E-Discovery)
27(11)
Summary
31(1)
Test Your Skills
31(7)
Computer Forensics and Digital Detective Work
38(41)
The Role of E-Evidence in Solving Physical and Computer Crimes
39(4)
Computer Forensics Science
43(3)
Digital Signatures and Profiling
46(2)
Computer Forensics and the E-Evidence Collection Process
48(5)
Suppression, Probable Cause, and Search Warrants
53(7)
Types of Motives and Cybercrimes
60(7)
Forensics Rules and Evidence Issues
67(3)
Computer Forensics Investigator's Responsibilities
70(9)
Summary
70(1)
Test Your Skills
71(8)
PART TWO Preparing for E-Evidence Collection and Preservation
79(114)
Tools, Environments, Equipment, and Certifications
81(39)
Managing the Life-Cycle of a Case
82(3)
Acquiring and Authenticating the E-Evidence
85(6)
Searching and Analyzing the Data
91(4)
Investigative Environments and Analysis Modes
95(1)
Forensic Tools and Toolkits
96(10)
Forensics Equipment
106(4)
Certification and Training Programs
110(10)
Summary
111(1)
Test Your Skills
112(8)
Policies and Procedures
120(37)
Reasons for Policies and Procedures
121(2)
Precase Preparations
123(5)
Steps in the Forensic Examination
128(10)
Examining the Evidence
138(5)
The Art of Forensics: Analyzing the Data
143(5)
Reporting on the Investigation
148(9)
Summary
151(1)
Test Your Skills
152(5)
Data, PDA, and Cell Phone Forensics
157(36)
Basic Hard Drive Technology
158(3)
Other Storage Technologies
161(4)
Personal Digital Assistant Devices (PDAs)
165(1)
Cellular Phones
166(1)
Drive and Media Analysis
167(6)
PDA Analysis
173(2)
Cellular Phone Analysis
175(3)
Disk Image Forensic Tools
178(2)
PDA/Cellular Phone Forensic Software
180(13)
Summary
187(1)
Test Your Skills
188(5)
PART THREE Forensic Examination of Computers and Digital and Electronic Media
193(124)
Operating Systems and Data Transmission Basics for Digital Investigations
195(41)
What Is an Operating System?
196(1)
Major Components of an Operating System
197(4)
Common Operating Systems
201(15)
Common File System Types
216(5)
OSI and TCP/IP Models
221(15)
Summary
229(1)
Test Your Skills
229(7)
Investigating Windows, Linux, and Graphics Files
236(46)
Investigating Windows Systems
237(3)
Finding User Data and Profiles in Windows Folders
240(7)
Investigating System Artifacts
247(7)
Investigating Linux Systems
254(8)
Graphic File Forensics
262(20)
Summary
267(1)
Test Your Skills
267(15)
E-Mail and Webmail Forensics
282(35)
Importance of E-Mail as Evidence
283(1)
Working with E-Mail
284(6)
Working with Webmail
290(3)
Working with Mail Servers
293(3)
Examining E-Mails for Evidence
296(8)
Working with Instant Messaging
304(13)
Summary
306(1)
Test Your Skills
307(10)
PART FOUR Detecting Intrusions, Malware, and Fraud
317(88)
Internet and Network Forensics and Intrusion Detection
319(29)
An Introduction to Network Forensics and Intrusion Detection
320(6)
Data Sources on a Network
326(5)
Physical Aspects of Capturing Data
331(1)
Logical Aspects of Capturing Data
332(1)
Examining Data
333(5)
NFAT Software Tools
338(10)
Summary
342(1)
Test Your Skills
342(6)
Tracking Down Those Who Intend to Do Harm on a Large Scale
348(24)
Large-Scale Investigations
349(2)
Terrorism, Virtual Warfare, and Other Types of Internet-Based Hostilities
351(7)
Botnets and Criminal Commerce
358(3)
Tracking Criminals' Trails
361(11)
Summary
364(1)
Test Your Skills
364(8)
Fraud and Forensic Accounting Investigation
372(33)
Challenges of Fraud Investigations
373(9)
Types of Fraud
382(8)
Characteristics and Symptoms of Fraud
390(2)
Fraud Investigation and Deterrence
392(2)
Digital Forensic Accounting
394(11)
Summary
397(1)
Test Your Skills
398(7)
PART FIVE Legal, Ethical, and Testimony Topics
405(62)
Federal Rules and Criminal Codes
407(29)
Due Process of the Law
408(9)
Anticrime Laws
417(19)
Summary
429(1)
Test Your Skills
429(7)
Ethical and Professional Responsibility in Testimony
436(31)
The Importance of Forensic Expert Witnesses and Expert Reports
437(6)
The Trial Process
443(7)
Guidelines for Testifying
450(8)
Professional and Educational Resources
458(9)
Summary
459(1)
Test Your Skills
460(7)
Appendix A: Online Resources 467(5)
Appendix B: Government and Legal References 472(6)
Appendix C: Sample Legal Forms, Letters, and Motions 478(26)
Appendix D: Summaries of Court Cases 504(4)
Glossary 508(8)
References 516(7)
Index 523


Please wait while the item is added to your cart...