did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470932407

Investigative Computer Forensics The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

by
  • ISBN13:

    9780470932407

  • ISBN10:

    0470932406

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2013-04-15
  • Publisher: Wiley
  • Purchase Benefits
List Price: $90.66 Save up to $14.16
  • Digital
    $76.50
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both domestically and abroad.

Author Biography

ERIK LAYKIN, CHFI, CEDS, is a Managing Director of Duff & Phelps, LLC and was a cofounder of its Global Electronic Discovery and Investigations practice. He focuses on large-scale international corporate investigations and high-stakes litigation issues in which computer forensics and electronic discovery play a major role. Mr. Laykin is frequently appointed as an expert witness, independent neutral, or special master in federal and state courts and has served in an advisory capacity to hundreds of corporations, law firms, and government agencies in the U.S., Asia, and Europe. As an early pioneer in the computer forensics and cybercrime field, he regularly comments on these emerging technology and business issues at industry conferences and for the media, including CNN, Fox, ABC, NBC, CBS, major newspapers, and periodicals. Mr. Laykin is active in a variety of organizations including the HTCIA (High Technology Crime Investigation Association), FEWA (Forensic Expert Witness Association), ABA (American Bar Association), and is a past president (Los Angeles) and Pacific Rim director of the FBI's InfraGard Program.

Table of Contents

Foreword

Preface

This Book’s Setup

Acknowledgments

Introduction

Investigative Computer Forensics

Changes in Technology

Changes in the Role of the Investigator

What Is Computer Forensics?

Chapter 1 The Glue

The Relevancy of Truth

Foundations of Digital Evidence

Investigative Objectives

The Investigative Process

Trust

Privacy

Chapter 2 A Primer on Computers and Networks

The Mechanics of Electronically Stored Information

Optical Drives

The Server

The Router

Application Data

Metadata

Databases

Email Mechanics

The IP Address

Computer Time Artifacts

Social Media

Tablets

Cellular Telephones and Smart Phones

Audio and Video

The Global Nervous System Worldwide Data

Fundamentals of Network Traffic

The Firewall

Data- and Traffic-Gathering Applications

Dynamic Data Capture

The Cloud

International Data Security and Privacy Issues

Chapter 3 Computer Forensic Fundamentals

The Establishment of the Computer Forensic Laboratory

Evidence and Access Controls

The Forensic Work Station

Current Tools and Services

Imaging Hardware

X1 Discovery

NetAnalysis

Building a Team and a Process

Computer Forensic Certifications

The Human Quotient

The Devil is in the Details

Chapter 4 Investigative Fundamentals

The Investigative Mindset

Case Management

Fraud and Investigative Analysis

Information Sources and Records

Investigative Techniques

Surveillance and Interviewing

Trade Secret Theft and IP Investigations

HR and Interpersonal Investigations

Reporting and Testifying

Chapter 5 The Underpinnings of Investigative Computer Forensics

Seizure and Examination of Digital Evidence

Data Classification and Records Management

Deleted Data

Backups and Systems Preservation

Computer Crime Analysis and Reconstruction

The Who, What, Where, How of Data

Contracts Agreements, Third Parties, and Other Headaches

Ethics and Management

Chapter 6 Tactical Objectives and Challenges in Investigative Computer Forensics

Preparing for the Attack

Early Case Assessment

Investigative Pacing, Timing, and Setting Expectations

Working with Multinational Teams

Collections of Electronic Data in the Cloud and in Social Media

Investigating Internet Service Provider Records

Bridging the Actual World with the Cyber World

Packaging the Findings

Chapter 7 The Cyber Firefighters

Incident Response Fundamentals

Data Breaches

Theft and Fraud

Systems Failures

Internal Investigations

The Real-Time Predicament

Building a Global Resource Network

Honeypots and Other Attractive Intel-Gathering Targets

Money Laundering and Internet Fraud

Investigating Accounting Irregularities

Databases and Structured Data

Organized Crime in the Cyber Underworld

The Cyber Underworld in Various Regions

State-Sponsored Cyber Crime

Common Cyber Threats

Identity Theft

Intellectual Property and Trade Secret Theft

Botnets, Malware, Trojans, and Phishing

Data Breach Vulnerabilities

The Hacker and His Environment

Chapter 8 eDiscovery Responsibilities

Electronic Discovery Reference Model

eDiscovery Responsibilities

Common eDiscovery Challenges

Tools Services and Technologies

Nuix

LEXIS-NEXIS Law

Emerging eDiscovery Realities

European and Asian Observations

Digital Evidence in the Courtroom

Chapter 9 The Future

Privacy and the Data Ecosystem

Access Controls and the Evolution of Trust

Global Communications Systems in the Cloud

Nanotechnology and Cognitive Computing

Digital Demographics and the Emerging Global Citizen

Extra National Investigative Networks

Zero Day Forensics

Concluding Thoughts

Index

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program