Computer forensics for dummies
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a comp...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. : Chichester :
Wiley ; John Wiley [distributor]
2008.
|
Edición: | 1st edition |
Colección: | --For dummies.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627516006719 |
Tabla de Contenidos:
- Computer Forensics For Dummies; About the Authors; Dedication; Authors' Acknowledgments; Contents at a Glance; Table of Contents; Introduction; Who Should Read This Book?; About This Book; How to Use This Book; What You Don't Need to Read; Foolish Assumptions; How This Book Is Organized; About the Web Site and Blog; Icons Used in This Book; Where to Go from Here; Part I: Digging Out and Documenting Electronic Evidence; Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away - Until Revelation Day; Living and Working in a Recorded World
- Giving the Third Degree to Computers, Electronics, and the InternetAnswering the Big Questions; Examining Investigative Methods; Revealing Investigation Results; Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation; Deciphering the Legal Codes; Managing E-Discovery; Conducting the Investigation in Good Faith; Deciding Who's Paying the Bill; Chapter 3: Getting Authorized to Search and Seize; Getting Authority: Never Start Without It; Criminal Cases: Papering Your Behind (CYA); Civil Cases: Verifying Company Policy; Chapter 4: Documenting and Managing the Crime Scene
- Obsessing over DocumentationDirecting the Scene; Managing Evidence Behind the Yellow Tape; Stepping Through the Scene; Part II: Preparing to Crack the Case; Chapter 5: Minding and Finding the Loopholes; Deciding to Take On a Client; Determining Whether You Can Help the Case; Passing the Court's Standard As a Reliable Witness; Going Forward with the Case; Keeping a Tight Forensic Defense; Chapter 6: Acquiring and Authenticating E-Evidence; Acquiring E-Evidence Properly; Step 1: Determine the Type of Media You're Working With; Step 2: Find the Right Tool; Step 3: Transfer Data
- Step 4: Authenticate the Preserved DataStep 5: Make a Duplicate of the Duplicate; Chapter 7: Examining E-Evidence; The Art of Scientific Inquiry; Gearing Up for Challenges; Getting a Handle on Search Terms; Challenging Your Results: Plants and Frames and Being in the Wrong Place; Finding No Evidence; Reporting Your Analysis; Chapter 8: Extracting Hidden Data; Recognizing Attempts to Blind the Investigator; Defeating Algorithms, Hashes, and Keys; Finding Out-of-Sight Bytes; Cracking Passwords; Decrypting the Encrypted; Part III: Doing Computer Forensics Investigations
- Chapter 9: E-Mail and Web ForensicsOpening Pandora's Box of E-Mail; Scoping Out E-Mail Architecture; Seeing the E-Mail Forensics Perspective; Examining Client-Based E-Mail; Investigating Web-Based Mail; Searching Browser Files; Looking through Instant Messages; Chapter 10: Data Forensics; Delving into Data Storage; Finding Digital Cavities Where Data Hides; Extracting Data; Rebuilding Extracted Data; Chapter 11: Document Forensics; Finding Evidential Material in Documents: Metadata; Honing In on CAM (Create, Access, Modify) Facts; Discovering Documents; Chapter 12: Mobile Forensics
- Keeping Up with Data on the Move