Linked e-resources
Details
Table of Contents
A definition of computer forensics
Introduction
Forensic science
The history of computer forensics
The world wide web
The hacker community
Conclusion
Basic of computer forensic concepts
Introduction
Understanding digital evidence
Storage
Processing
What is computer data?
Output
Conclusion
Preservation and collection of digital evidence
Introduction
Rules of evidence
Preservation
Collection
Conclusion
Analysis of digital evidence
Introduction
Forensic analysis
Conclusion
Reporting and rendering the opinion
Introduction
Preparing the report
Presentation
The trial process
Conclusion
Computer attacks
Hackers and phreakz oh my
The hacker: unauthorized use and trespassing
Wireless hacking
Malware
Attacks from the inside
Conclusion
Computers as tools for evil
Introduction
Computers and crime
Identity theft
Concealment
Auction fraud and retail cons
Counterfeiting and forgery
Prostitution
Securities fraud
Conclusion
Computer tools and the forensic examination
Introduction
Assuming control of the case
Understand the case
Evaluate the evidence
Examining the ?live? system
Collecting data from a dead system
Imaging the drive
Data extraction
Data analysis
Conclusion
Presenting digital evidence in court
Introduction
Evidence
Types of evidence
Expert witnesses
Legal requirements of evidence
Search and seizure
Conclusion
Index.
Introduction
Forensic science
The history of computer forensics
The world wide web
The hacker community
Conclusion
Basic of computer forensic concepts
Introduction
Understanding digital evidence
Storage
Processing
What is computer data?
Output
Conclusion
Preservation and collection of digital evidence
Introduction
Rules of evidence
Preservation
Collection
Conclusion
Analysis of digital evidence
Introduction
Forensic analysis
Conclusion
Reporting and rendering the opinion
Introduction
Preparing the report
Presentation
The trial process
Conclusion
Computer attacks
Hackers and phreakz oh my
The hacker: unauthorized use and trespassing
Wireless hacking
Malware
Attacks from the inside
Conclusion
Computers as tools for evil
Introduction
Computers and crime
Identity theft
Concealment
Auction fraud and retail cons
Counterfeiting and forgery
Prostitution
Securities fraud
Conclusion
Computer tools and the forensic examination
Introduction
Assuming control of the case
Understand the case
Evaluate the evidence
Examining the ?live? system
Collecting data from a dead system
Imaging the drive
Data extraction
Data analysis
Conclusion
Presenting digital evidence in court
Introduction
Evidence
Types of evidence
Expert witnesses
Legal requirements of evidence
Search and seizure
Conclusion
Index.