Investigative Computer Forensics Using Computer Forensics in eDiscovery, Forensic Accounting Analysis and Investigating Corporate Fraud

  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: eBook
  • Copyright: 2013-03-20
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $80.00 Save up to $8.00
  • Rent Book $72.00
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both domestically and abroad.

Table of Contents



This Book’s Setup



Investigative Computer Forensics

Changes in Technology

Changes in the Role of the Investigator

What Is Computer Forensics?

Chapter 1 The Glue

The Relevancy of Truth

Foundations of Digital Evidence

Investigative Objectives

The Investigative Process



Chapter 2 A Primer on Computers and Networks

The Mechanics of Electronically Stored Information

Optical Drives

The Server

The Router

Application Data



Email Mechanics

The IP Address

Computer Time Artifacts

Social Media


Cellular Telephones and Smart Phones

Audio and Video

The Global Nervous System Worldwide Data

Fundamentals of Network Traffic

The Firewall

Data- and Traffic-Gathering Applications

Dynamic Data Capture

The Cloud

International Data Security and Privacy Issues

Chapter 3 Computer Forensic Fundamentals

The Establishment of the Computer Forensic Laboratory

Evidence and Access Controls

The Forensic Work Station

Current Tools and Services

Imaging Hardware

X1 Discovery


Building a Team and a Process

Computer Forensic Certifications

The Human Quotient

The Devil is in the Details

Chapter 4 Investigative Fundamentals

The Investigative Mindset

Case Management

Fraud and Investigative Analysis

Information Sources and Records

Investigative Techniques

Surveillance and Interviewing

Trade Secret Theft and IP Investigations

HR and Interpersonal Investigations

Reporting and Testifying

Chapter 5 The Underpinnings of Investigative Computer Forensics

Seizure and Examination of Digital Evidence

Data Classification and Records Management

Deleted Data

Backups and Systems Preservation

Computer Crime Analysis and Reconstruction

The Who, What, Where, How of Data

Contracts Agreements, Third Parties, and Other Headaches

Ethics and Management

Chapter 6 Tactical Objectives and Challenges in Investigative Computer Forensics

Preparing for the Attack

Early Case Assessment

Investigative Pacing, Timing, and Setting Expectations

Working with Multinational Teams

Collections of Electronic Data in the Cloud and in Social Media

Investigating Internet Service Provider Records

Bridging the Actual World with the Cyber World

Packaging the Findings

Chapter 7 The Cyber Firefighters

Incident Response Fundamentals

Data Breaches

Theft and Fraud

Systems Failures

Internal Investigations

The Real-Time Predicament

Building a Global Resource Network

Honeypots and Other Attractive Intel-Gathering Targets

Money Laundering and Internet Fraud

Investigating Accounting Irregularities

Databases and Structured Data

Organized Crime in the Cyber Underworld

The Cyber Underworld in Various Regions

State-Sponsored Cyber Crime

Common Cyber Threats

Identity Theft

Intellectual Property and Trade Secret Theft

Botnets, Malware, Trojans, and Phishing

Data Breach Vulnerabilities

The Hacker and His Environment

Chapter 8 eDiscovery Responsibilities

Electronic Discovery Reference Model

eDiscovery Responsibilities

Common eDiscovery Challenges

Tools Services and Technologies



Emerging eDiscovery Realities

European and Asian Observations

Digital Evidence in the Courtroom

Chapter 9 The Future

Privacy and the Data Ecosystem

Access Controls and the Evolution of Trust

Global Communications Systems in the Cloud

Nanotechnology and Cognitive Computing

Digital Demographics and the Emerging Global Citizen

Extra National Investigative Networks

Zero Day Forensics

Concluding Thoughts


Rewards Program

Write a Review