![]() |
![]() |
Your cart is empty |
||
Showing 1 - 7 of 7 matches in All Departments
Following on the success of his introductory text, "Digital
Evidence and Computer Crime," Eoghan Casey brings together a few
top experts to create the first detailed guide for professionals
who are already familiar with digital evidence. The Handbook of
Computer Crime Investigation helps readers master the forensic
analysis of computer systems with a three-part approach covering
tools, technology, and case studies.
"Linux Malware Incident Response" is a "first look" at the "Malware
Forensics Field Guide for Linux Systems," exhibiting the first
steps in investigating Linux-based incidents. The Syngress Digital
Forensics Field Guides series includes companions for any digital
and computer forensic investigator and analyst. Each book is a
"toolkit" with checklists for specific tasks, case studies of
difficult situations, and expert analyst tips. This compendium of
tools for computer forensics analysts and investigators is
presented in a succinct outline format with cross-references to
supplemental appendices. It is designed to provide the digital
investigator clear and concise guidance in an easily accessible
format for responding to an incident or conducting analysis in a
lab.
"Malware Forensics: Investigating and Analyzing Malicious Code"
covers the emerging and evolving field of "live forensics," where
investigators examine a computer system to collect and preserve
critical live data that may be lost if the system is shut down.
Unlike other forensic texts that discuss "live forensics" on a
particular operating system, or in a generic context, this book
emphasizes a live forensics and evidence collection methodology on
both Windows and Linux operating systems in the context of
identifying and capturing malicious code and evidence of its effect
on the compromised system.
Crime scenes associated with child sexual exploitation and
trafficking in child pornography were once limited to physical
locations such as school playgrounds, church vestibules, trusted
neighbors' homes, camping trips and seedy darkly lit back rooms of
adult bookstores. The explosion of Internet use has created a
virtual hunting ground for sexual predators and has fueled a brisk,
multi-billion dollar trade in the associated illicit material.
Approximately half of the caseload in computer crimes units
involves the computer assisted sexual exploitation of children.
Despite the scale of this problem, or perhaps because of it, there
are no published resources that bring together the complex mingling
of disciplines and expertise required to put together a computer
assisted child exploitation case.
"The Handbook of Digital Forensics and Investigation" builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.Itis also designed as an accompanying text to "Digital Evidence and Computer Crime, "now in its third edition, providing advanced material from specialists in each area of Digital Forensics. This unique collection details how to conduct digital
investigations in both criminal and civil contexts, and how to
locate and utilize digital evidence on computers, networks, and
embedded systems. Specifically, the Investigative Methodology
section of the Handbook provides expert guidance in the three main
areas of practice: Forensic Analysis, Electronic Discovery and
Intrusion Investigation. The Technology section is extended and
updated to reflect the state of the art in each area of
specialization. The main areas of focus in the Technology section
are forensic analysis of Windows, Unix, Macintosh, and embedded
systems (including cellular telephones and other mobile devices),
and investigations involving networks (including enterprise
environments and mobile telecommunications technology). "The
Handbook of Digital Forensics and Investigation" is an essential
technical reference and on-the-job guide that IT professionals,
forensic practitioners, law enforcement, and attorneys will rely on
when confronted with computer related crime and digital evidence of
any kind.
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists.
Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks. This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks. New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides. This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).
|
![]() ![]() You may like...
|