Catalogue


Handbook of digital forensics and investigation [electronic resource] /
edited by Eoghan Casey ; with contributions from Cory Altheide ... [et al.].
imprint
Amsterdam ; Boston : Academic, c2010.
description
xxvi, 567 p. : ill. ; 24 cm.
ISBN
0123742676 (pbk.), 9780123742674 (pbk.)
format(s)
Book
More Details
imprint
Amsterdam ; Boston : Academic, c2010.
isbn
0123742676 (pbk.)
9780123742674 (pbk.)
restrictions
Licensed for access by U. of T. users.
catalogue key
7938742
 
Includes bibliographical references and index.
A Look Inside
Reviews
Review Quotes
"... any library serving them would find this an excellent introduction." -E-Streams "Any law firm looking to get into the field would do well to start here." -E-Streams "... a useful introduction to an increasingly important field." -E-Streams
To find out how to look for other reviews, please see our guides to finding book reviews in the Sciences or Social Sciences and Humanities.
Summaries
Back Cover Copy
Handbook of DIGITAL FORENSICS AND INVESTIGATION Edited by EOGHAN CASEY , cmdLabs.com Author of Digital Evidence and Computer Crime Contributors: Cory Altheide (Mandiant) - Christopher Daywalt (cmdLabs) - Andrea de Donno (Lepta) - Dario Forte (DFLabs) - James Holley (Ernst & Young) - Andy Johnson (University of Maryland, Baltimore County) - Ronald van der Knijff (Netherlands Forensic Institute) - Anthony Kokocinski (CSC) - Paul Luehr (Stroz Friedberg) - Terrance Maguire (cmdLabs) - Ryan Pittman (US Army) - Curtis Rose (Curtis W. Rose & Associates) - Joseph Schwerha (TraceEvidence) - Dave Shaver (US Army) - Jessica Reust Smith (Stroz Friedberg) The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation , bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). KEY FEATURES Provides methodologies proven in practice for conducting digital investigations of all kinds Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. Shelving classification: Digital Forensics / Criminal Investigation
Back Cover Copy
Handbook of DIGITAL FORENSICS AND INVESTIGATION Edited by EOGHAN CASEY, cmdLabs.com Author of Digital Evidence and Computer CrimeContributors: Cory Altheide (Mandiant) - Christopher Daywalt (cmdLabs) - Andrea de Donno (Lepta) - Dario Forte (DFLabs) - James Holley (Ernst & Young) - Andy Johnson (University of Maryland, Baltimore County) - Ronald van der Knijff (Netherlands Forensic Institute) - Anthony Kokocinski (CSC) - Paul Luehr (Stroz Friedberg) - Terrance Maguire (cmdLabs) - Ryan Pittman (US Army) - Curtis Rose (Curtis W. Rose & Associates) - Joseph Schwerha (TraceEvidence) - Dave Shaver (US Army) - Jessica Reust Smith (Stroz Friedberg) The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). KEY FEATURESProvides methodologies proven in practice for conducting digital investigations of all kindsDemonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigationsPresents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platformsCase examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigationsThe Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. Shelving classification: Digital Forensics / Criminal Investigation
Bowker Data Service Summary
This handbook details how to conduct digital investigations in both criminal and civil contexts and how to locate and utilize digital evidence on computers, networks, and embedded systems. It provides guidance in the three main areas of practice: forensic analysis, electronic discovery and intrusion investigation.
Main Description
"The Handbook of Digital Forensics and Investigation" builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.Itis also designed as an accompanying text to "Digital Evidence and Computer Crime, "now in its third edition, providing advanced material from specialists in each area of Digital Forensics. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). "The Handbook of Digital Forensics and Investigation" is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds*Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms*Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations
Main Description
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime, now in its third edition, providing advanced material from specialists in each area of Digital Forensics. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds *Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms *Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations
Main Description
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds *Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms *Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations
Main Description
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds *Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms *Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations.
Table of Contents
Introduction
Investigative Methodology
Forensic Analysis
Electronic Discovery
Intrusion Investigation
Technology
Windows Forensic Analysis
UNIX Forensic Analysis
Macintosh Forensic Analysis
Embedded Systems Analysis
Handbook Network Investigations
Mobile Network Investigations
Table of Contents provided by Publisher. All Rights Reserved.

This information is provided by a service that aggregates data from review sources and other sources that are often consulted by libraries, and readers. The University does not edit this information and merely includes it as a convenience for users. It does not warrant that reviews are accurate. As with any review users should approach reviews critically and where deemed necessary should consult multiple review sources. Any concerns or questions about particular reviews should be directed to the reviewer and/or publisher.

  link to old catalogue

Report a problem