did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780763779979

Computer Forensics: Computer Crime Scene Investigation

by
  • ISBN13:

    9780763779979

  • ISBN10:

    0763779970

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2026-01-13
  • Publisher: Jones & Bartlett Learning

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $169.95 Save up to $85.83
  • Rent Book $84.12
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Despite efforts to safeguard sensitive data and networks, organizations today face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and includes fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organization with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised systems. It includes a comprehensive introduction to computer forensics investigative techniques and provides readers with the knowledge and skills required to conduct a computer forensics investigation from initial discovery to completion.  Readers will also learn how to exploit your organization's Computer Incident Response Team (CIRT); collect, manage, and record digital evidence; and leverage powerful software tools and techniques to uncover hidden or deleted information. Key topics include:  Responding to incidents and investigating computer crime, conducting and managing an investigation, performing disk-based analysis, investigating information-hiding techniques, examining e-mail, tracing internet access, searching memory in real-time, And The forensics challenge competition.

Table of Contents

PartPart 1 Overview of Computer Forensics Technology
ChapterChapter 1 Computer Forensics Fundamentals
ChapterChapter 2 Types of Computer Forensics Technology
ChapterChapter 3 Types of Computer Forensics Systems
ChapterChapter 4 Types of Vendor and Computer Forensics Services
PartPart 2 Computer Forensics Investigations
ChapterChapter 5 Handling Preliminary Investigations
ChapterChapter 6 Controlling an Investigation
ChapterChapter 7 Investigating Information-Hiding Techniques
ChapterChapter 8 Investigating and Scrutinizing E-Mail
PartPart 3 Computer Forensics Evidence and Capture
ChapterChapter 9 Conducting Disk-Based Analysis
ChapterChapter 10 Data Recovery
ChapterChapter 11 Evidence Collection and Data Seizure
ChapterChapter 12 Duplication and Preservation of Digital Evidence
ChapterChapter 13 Computer Image Verification and Authentication
PartPart 4 Computer Forensics Analysis
ChapterChapter 14 Discovery of Electronic Evidence
ChapterChapter 15 Identification of Data
ChapterChapter 16 Reconstructing Past Events
ChapterChapter 17 Networks
PartPart 5 Countermeasures: Cyberwarfare
ChapterChapter 18 Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
ChapterChapter 19 The Cyberwarfare Arsenal and Tactics of the Military
ChapterChapter 20 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
ChapterChapter 21 The Information Warfare Arsenal and Tactics of Private Companies
ChapterChapter 22 The Cyberwarfare Arsenal of the Future
ChapterChapter 23 Surveillance Tools for Cyberwarfare of the Future
ChapterChapter 24 Civilian Causalities: The Victims and Refugees of Cyberwarfare
PartPart 6 Real-time and Advanced Computer Forensics Systems and Future Directions
ChapterChapter 25 Searching Memory in Real Time
ChapterChapter 26 Advanced Computer Forensics
ChapterChapter 27 Summary, Conclusions, and Recommendations
PartPart 7 Appendices
AppendixAppendix A Frequently Asked Questions
AppendixAppendix B Computer Forensics Resources
AppendixAppendix C Links to Computer Forensics and Related Law Enforcement Web Pages
AppendixAppendix D More Computer Forensics Cases
AppendixAppendix E Securing Windows 2003 and Vista Environment: Hands-On
AppendixAppendix F Patching Microsoft Environments: Hands-On
AppendixAppendix G Answers to Review Questions/Exercises, Hands-on Projects, Case Projects, and Optional Team Case Project by Chapter
AppendixAppendix H Checklists by Chapter
AppendixAppendix I About the CD-ROM
AppendixAppendix J Glossary of Terms and Acronyms

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program