
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Computer Forensics For Dummies
About this book
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.
You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You'll discover how to use the latest forensic software, tools, and equipment to find the answers that you're looking for in record time. When you understand how data is stored, encrypted, and recovered, you'll be able to protect your personal privacy as well. By the time you finish reading this book, you'll know how to:
- Prepare for and conduct computer forensics investigations
- Find and filter data
- Protect personal privacy
- Transfer evidence without contaminating it
- Anticipate legal loopholes and opponents' methods
- Handle passwords and encrypted data
- Work with the courts and win the case
Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Digging Out and Documenting Electronic Evidence

Knowing What Your Digital Devices Create, Capture, and Pack Away — Until Revelation Day





Living and Working in a Recorded World
Deleting is a misnomer
- An entry is made into the File Allocation Table (FAT) to indicate the space where Sand.doc is stored in the Data Region. Like all files, Sand.doc is assigned (allocated) space on the hard drive. Those spaces are clusters. The FAT file system is supported by virtually all existing operating systems for personal computers.
- A directory entry is made to indicate Sand.doc as the filename, its size, link to the FAT, and some other information.
- Sand.doc is written to the data region. That is, it’s saved to a cluster on the hard drive. (Of course, files may occupy more than one cluster, but we’re keeping it simple.)
- The FAT entry for the file is zeroed out. That’s geek-speak for “the cluster that’s storing Sand.doc is declared digitally vacant and available to store another file.”
- The first character of the directory entry filename is changed to a special character so that the operating system knows to ignore it. In effect, it’s only pretending that the file isn’t there.
- The operating system must save another file (such as Water.doc) in the exact same cluster.
- Water.doc must be at least as large as Sand.doc.

- You have no control over where the operating system saves files.
- The bigger the hard drive, the lower the probability that an existing deleted file will be overwritten.
Table of contents
- Cover
- Title Page
- Table of Contents
- Introduction
- Part I: Digging Out and Documenting Electronic Evidence
- Part II: Preparing to Crack the Case
- Part III: Doing Computer Forensics Investigations
- Part IV: Succeeding in Court
- Glossary
- Cheat Sheet
- Connect with Dummies
- End User License Agreement

