CART

(0) items

Investigative Computer Forensics : Using Computer Forensics in eDiscovery, Forensic Accounting Analysis and Investigating Corporate Fraud,9780470932407
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Investigative Computer Forensics : Using Computer Forensics in eDiscovery, Forensic Accounting Analysis and Investigating Corporate Fraud

by
Edition:
1st
ISBN13:

9780470932407

ISBN10:
0470932406
Format:
Hardcover
Pub. Date:
4/15/2013
Publisher(s):
Wiley
List Price: $78.95

Rent Textbook

(Recommended)
 
Term
Due
Price
$71.06

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
N9780470932407
$76.98

eTextbook


 
Duration
Price
$76.79

Used Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $31.99
See Prices

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 1st edition with a publication date of 4/15/2013.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Summary

Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both domestically and abroad.

Author Biography

ERIK LAYKIN, CHFI, CEDS, is a Managing Director of Duff & Phelps, LLC and was a cofounder of its Global Electronic Discovery and Investigations practice. He focuses on large-scale international corporate investigations and high-stakes litigation issues in which computer forensics and electronic discovery play a major role. Mr. Laykin is frequently appointed as an expert witness, independent neutral, or special master in federal and state courts and has served in an advisory capacity to hundreds of corporations, law firms, and government agencies in the U.S., Asia, and Europe. As an early pioneer in the computer forensics and cybercrime field, he regularly comments on these emerging technology and business issues at industry conferences and for the media, including CNN, Fox, ABC, NBC, CBS, major newspapers, and periodicals. Mr. Laykin is active in a variety of organizations including the HTCIA (High Technology Crime Investigation Association), FEWA (Forensic Expert Witness Association), ABA (American Bar Association), and is a past president (Los Angeles) and Pacific Rim director of the FBI's InfraGard Program.

Table of Contents

Foreword

Preface

This Book’s Setup

Acknowledgments

Introduction

Investigative Computer Forensics

Changes in Technology

Changes in the Role of the Investigator

What Is Computer Forensics?

Chapter 1 The Glue

The Relevancy of Truth

Foundations of Digital Evidence

Investigative Objectives

The Investigative Process

Trust

Privacy

Chapter 2 A Primer on Computers and Networks

The Mechanics of Electronically Stored Information

Optical Drives

The Server

The Router

Application Data

Metadata

Databases

Email Mechanics

The IP Address

Computer Time Artifacts

Social Media

Tablets

Cellular Telephones and Smart Phones

Audio and Video

The Global Nervous System Worldwide Data

Fundamentals of Network Traffic

The Firewall

Data- and Traffic-Gathering Applications

Dynamic Data Capture

The Cloud

International Data Security and Privacy Issues

Chapter 3 Computer Forensic Fundamentals

The Establishment of the Computer Forensic Laboratory

Evidence and Access Controls

The Forensic Work Station

Current Tools and Services

Imaging Hardware

X1 Discovery

NetAnalysis

Building a Team and a Process

Computer Forensic Certifications

The Human Quotient

The Devil is in the Details

Chapter 4 Investigative Fundamentals

The Investigative Mindset

Case Management

Fraud and Investigative Analysis

Information Sources and Records

Investigative Techniques

Surveillance and Interviewing

Trade Secret Theft and IP Investigations

HR and Interpersonal Investigations

Reporting and Testifying

Chapter 5 The Underpinnings of Investigative Computer Forensics

Seizure and Examination of Digital Evidence

Data Classification and Records Management

Deleted Data

Backups and Systems Preservation

Computer Crime Analysis and Reconstruction

The Who, What, Where, How of Data

Contracts Agreements, Third Parties, and Other Headaches

Ethics and Management

Chapter 6 Tactical Objectives and Challenges in Investigative Computer Forensics

Preparing for the Attack

Early Case Assessment

Investigative Pacing, Timing, and Setting Expectations

Working with Multinational Teams

Collections of Electronic Data in the Cloud and in Social Media

Investigating Internet Service Provider Records

Bridging the Actual World with the Cyber World

Packaging the Findings

Chapter 7 The Cyber Firefighters

Incident Response Fundamentals

Data Breaches

Theft and Fraud

Systems Failures

Internal Investigations

The Real-Time Predicament

Building a Global Resource Network

Honeypots and Other Attractive Intel-Gathering Targets

Money Laundering and Internet Fraud

Investigating Accounting Irregularities

Databases and Structured Data

Organized Crime in the Cyber Underworld

The Cyber Underworld in Various Regions

State-Sponsored Cyber Crime

Common Cyber Threats

Identity Theft

Intellectual Property and Trade Secret Theft

Botnets, Malware, Trojans, and Phishing

Data Breach Vulnerabilities

The Hacker and His Environment

Chapter 8 eDiscovery Responsibilities

Electronic Discovery Reference Model

eDiscovery Responsibilities

Common eDiscovery Challenges

Tools Services and Technologies

Nuix

LEXIS-NEXIS Law

Emerging eDiscovery Realities

European and Asian Observations

Digital Evidence in the Courtroom

Chapter 9 The Future

Privacy and the Data Ecosystem

Access Controls and the Evolution of Trust

Global Communications Systems in the Cloud

Nanotechnology and Cognitive Computing

Digital Demographics and the Emerging Global Citizen

Extra National Investigative Networks

Zero Day Forensics

Concluding Thoughts

Index



Please wait while the item is added to your cart...