Handbook of Computer Crime Investigation: Forensic Tools and Technology
Books / Paperback
ISBN: 0121631036 / Publisher: Academic Press, November 2001
Detailed technical information is presented that can be used to help solve crime involving computers, for professionals who are already familiar with digital evidence. The handbook tells how to locate and use evidence in computer hard drives, shared networks, wireless devices, and embedded systems. Advantages and disadvantages of software and hardware for collecting and analyzing digital evidence are discussed, and instructions are given for collecting and analyzing digital evidence in common situations. Case examples demonstrate technical, legal, and practical challenges. Casey is a system security administrator for Yale University. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool.The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.The Tools section provides details of leading hardware and software · The main Technology section provides the technical "how to" information · for collecting and analysing digital evidence in common situationsCase Examples give readers a sense of the technical, legal, and practical · challenges that arise in real computer investigations
Read Less