Cyber forensics a field manual for collecting, examining, and preserving evidence of computer crimes
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton, NY :
Auerbach Publications
2008.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628997306719 |
Tabla de Contenidos:
- Front cover; Disclaimer; Dedication; Dedication; Contents; Foreword; Acknowledgments; About the Authors; Chapter 1. Introduction; Chapter 2. Cyber Forensic Tools and Utilities; Chapter 3. Concealment Techniques; Chapter 4. Hardware: Model System Platforms; Chapter 5. Software: Operating, Systems, Network Traffic, and Applications; Chapter 6. Standard Operating Procedures: Digital Forensic Laboratory Accreditation Standards; Chapter 7. Performing a Cyber Forensic Investigation: Flowchart for the Seizure of Electronic Evidence and Associated Internal Control Questionaires
- Chapter 8. Privacy and Cyber Forensics: An Australian PerspectiveChapter 9. Forensic Black Bag; Chapter 10. Digital Multifunctional Devices: Forensic Value and Corporate Exposure; Chapter 11. Cyber Forensics and the Law: Legal Considerations; Chapter 12. Cyber Forensics and the Changing Face of Investigating Criminal Behavior; Chapter 13. Electronically Stored Information and Cyber Forensics; Chapter 14. Cyber Forensic Awareness: Management Survey; Appendix A: Computer Forensic Forensic Web Sites; Appendix B: Cyber Crime and Forensic Organizations
- Appendix C: Cyber Forensic Training Resources ListAppendix D: Pertinent Legistlation; Appendix E: Recommended Readings; Appendix F: Management Assessment: 20 Questions; Appendix G: Flowchart for the Seizure of a Personal Digital Assistant; Appendix H: Additional Information: Computer Hardware; Appendix I: Questions That Every Cyber Investigator Should Ask; before, during, and after an Investigation; Appendix J: Cyber Forensic Best Practcice Recommendations; Appendix K: Steganography Tools; Appendix L: Forensic Resources-Literature and Selected Readings; Appendix M: Forensic Online Resources
- Appendix N: Locating Forensic Data in Windows RegistriesAppendix O: Sedona Principles for Electronic Document Production; Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments; Appendix Q: Selected Acronyms; Appendix R: Generic Cellular Telephone Search Warrants; Appendix S: Generic Computer Search Warrant; Appendix T: Generic Affidavit for Search Warrant; Appendix U: Configuring the Investigator's Forensic Analysis Machine; Appendix V: Generic Search Warrant; Appendix W: Statement of Underlying Facts and Circumtances
- Appendix X: Generic State Court Order-Seizure of Electronic Hardware and RecordsAppendix Y: Consent to Search; Appendix Z: Confidential Cyber Forensics Questionnaire; Appendix AA: Forensic Case Study: Files from the Field; Glossary of Terms; Index; Back cover