
- 736 pages
- English
- PDF
- Available on iOS & Android
The Best Damn Cybercrime and Digital Forensics Book Period
About this book
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.* Digital investigation and forensics is a growing industry* Corporate I.T. departments investigating corporate espionage and criminal activities are learning as they go and need a comprehensive guide to e-discovery* Appeals to law enforcement agencies with limited budgets
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front Cover
- The Best Damn Cybercrime and Digital Forensics Book Period
- Copyright Page
- Contributing Authors
- Contents
- Chapter 1: Computer Forensics in Today’s World
- Chapter 2: Digital Forensics: An Overview
- Chapter 3: Developing an Enterprise Digital Investigative/Electronic Discovery Capability
- Chapter 4: Integrating a Quality Assurance Program in a Digital Forensic Laboratory
- Chapter 5: Balancing E-discovery Challenges with Legal and IT Requirements
- Chapter 6: Forensic Software and Hardware
- Chapter 7: Incident Response: Live Forensics and Investigations
- Chapter 8: Seizure of Digital Information
- Chapter 9: Conducting Cyber Investigations
- Chapter 10: Acquiring Data, Duplicating Data, and Recovering Deleted Files
- Chapter 11: Forensic Discovery and Analysis Using BackTrack
- Chapter 12: Windows, Linux, and Macintosh Boot Processes
- Chapter 13: Windows and Linux Forensics
- Chapter 14: Investigating Network Traffic and Investigating Logs
- Chapter 15: Router Forensics and Network Forensics
- Chapter 16: Investigating Wireless Attacks
- Chapter 17: E-mail Forensics
- Chapter 18: Steganography and Application Password Crackers
- Chapter 19: PDA and Blackberry
- Chapter 20: MP3 Forensics
- Index