Flylib.com
Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279
Authors:
Eoghan Casey BS MA
BUY ON AMAZON
BackCover
BackCover
Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, Second Edition
Introduction
Reliability of Digital Evidence
The Need for Standardization
Roadmap to the Book
Disclaimer
Part 1: Digital Investigation
Chapter 1: Digital Evidence and Computer Crime
1.1 Digital Evidence
1.2 Increasing Awareness of Digital Evidence
1.3 Challenging Aspects of Digital Evidence
1.4 Following the Cybertrail
1.5 Challenging Aspects of the Cybertrail
1.6 Forensic Science and Digital Evidence
1.7 Summary
References
Cases
Chapter 2: History and Terminology of Computer Crime Investigation
2.1 Brief History of Computer Crime Investigation
2.2 Evolution of Investigative Tools
2.3 Language of Computer Crime Investigation
2.4 Summary
References
Cases
Chapter 3: Technology and Law
Part A Technology and Law - A Us Perspective
3A.1 Jurisdiction
3A.2 Pornography and Obscenity
3A.3 Privacy
3A.4 Copyrights and the Theft of Digital Intellectual Property
Part B Computer Misuse in America
Part C Technology and Criminal Law - A European Perspective
3C.1 Overview of Criminal Offenses
3C.2 Search and Seizure
3C.3 Jurisdiction and Extradition
3C.4 Penalties
3C.5 Privacy
3C.6 Summary
United States Perspective Bibliography
Legislation
References
European Perspective BibliographySuggested Further Reading
Legislation
References
Chapter 4: The Investigative Process
4.1 The Role of Digital Evidence
4.2 Investigative Methodology
4.3 Summary
References
Cases
Chapter 5: Investigative Reconstruction with Digital Evidence
5.1 Equivocal Forensic Analysis
5.2 Victimology
5.3 Crime Scene Characteristics
5.4 Evidence Dynamics and the Introduction of Error
5.5 Reporting
5.6 Summary
References
Cases
Chapter 6: Modus Operandi, Motive, and Technology
6.1 Axes to Pathological Criminals, and Other Unintended Consequences
6.2 Modus Operandi
6.3 Technology and Modus Operandi
6.4 Motive and Technology
6.5 Current Technologies
6.6 Summary
References
Chapter 7: Digital Evidence in the Courtroom
7.1 Admissibility - Warrants
7.2 Authenticity and Reliability
7.3 Casey s Certainty Scale
7.4 Best Evidence
7.5 Direct versus Circumstantial Evidence
7.6 Hearsay
7.7 Scientific Evidence
7.8 Presenting Digital Evidence
7.9 Summary
References
Cases
Part 2: Computers
Chapter 8: Computer Basics for Digital Investigators
8.2 Basic Operation of Computers
8.3 Representation of Data
8.4 Storage Media and Data Hiding
8.5 File Systems and Location of Data
8.6 Overview of Encryption
8.7 Summary
References
Cases
Chapter 9: Applying Forensic Science to Computers
9.1 Authorization and Preparation
9.2 Identification
9.3 Documentation
9.4 Collection and Preservation
9.5 Examination and Analysis
9.6 Reconstruction
9.7 Reporting
9.8 Summary
References
Cases
Chapter 10: Forensic Examination of Windows Systems
10.1 Windows Evidence Acquisition Boot Disk
10.2 File Systems
10.3 Overview of Digital Evidence Processing Tools
10.4 Data Recovery
10.5 Log Files
10.6 File System Traces
10.7 Registry
10.8 Internet Traces
10.9 Program Analysis
10.10 Summary
References
Cases
Chapter 11: Forensic Examination of Unix Systems
11.1 Unix Evidence Acquisition Boot Disk
11.2 File Systems
11.3 Overview of Digital Evidence Processing Tools
11.4 Data Recovery
11.5 Log Files
11.6 File System Traces
11.7 Internet Traces
11.8 Summary
References
Chapter 12: Forensic Examination of Macintosh Systems
12.2 Overview of Digital Evidence Processing Tools
12.3 Data Recovery
12.4 File System Traces
12.5 Internet Traces
12.6 Summary
Chapter 13: Forensic Examination of Handheld Devices
13.1 Overview of Handheld Devices
13.2 Collection and Examination of Handheld Devices
13.3 Dealing with Password Protection and Encryption
13.4 Related Sources of Digital Evidence
13.5 Summary
References
Cases
Part 3: Networks
Chapter 14: Network Basics for Digital Investigators
14.1 A Brief History of Computer Networks
14.2 Technical Overview of Networks
14.3 Network Technologies
14.4 Connecting Networks using Internet Protocols
14.5 Summary
References
Cases
Chapter 15: Applying Forensic Science to Networks
15.1 Preparation and Authorization
15.2 Identification
15.3 Documentation, Collection, and Preservation
15.4 Filtering and Data Reduction
15.5 ClassIndividual Characteristics and Evaluation of Source
15.6 Evidence Recovery
15.7 Investigative Reconstruction
15.8 Reporting Results
15.9 Summary
References
Cases
Chapter 16: Digital Evidence on Physical and Data-Link Layers
16.1 Ethernet
16.2 Linking the Data-Link and Network Layers - Encapsulation
16.3 Ethernet versus ATM Networks
16.4 Documentation, Collection, and Preservation
16.5 Analysis Tools and Techniques
16.6 Summary
References
Chapter 17: Digital Evidence at the Network and Transport Layers
17.1 TCPIP
17.2 Setting up a Network
17.3 TCPIP Related Digital Evidence
17.4 Summary
References
Chapter 18: Digital Evidence on the Internet
18.1 Role of the Internet in Criminal Investigations
18.2 Internet Services: Legitimate versus Criminal Uses
18.3 Using the Internet as an Investigative Tool
18.4 Online Anonymity and Self-Protection
18.5 E-Mail Forgery and Tracking
18.6 Usenet Forgery and Tracking
18.7 Searching and Tracking on IRC
18.8 Summary
References
Cases
Part 4: Investigating Computer Crime
Chapter 19: Investigating Computer Intrusions
19.1 How Computer Intruders Operate
19.2 Investigating Intrusions
19.3 Investigative Reconstruction
19.4 Detailed Case Example
19.5 Summary
References
Chapter 20: Sex Offenders on the Internet
20.1 Window to the World
20.2 Legal Considerations
20.3 Identifying and Processing Digital Evidence
20.4 Investigating Online Sexual Offenders
20.5 Investigative Reconstruction
20.6 Summary
References
Cases
Chapter 21: Cyberstalking
21.1 How Cyberstalkers Operate
21.2 Investigating Cyberstalking
21.3 Cyberstalking Case Example
21.4 Summary
References
Chapter 22: Digital Evidence as Alibi
22.1 Investigating an Alibi
22.2 Time as Alibi
22.3 Location as Alibi
22.4 Summary
Part 5: Guidelines
Chapter 23: Digital Evidence Handling Guidelines
23.1 Identification or Seizure
23.2 Preservation
Chapter 24: Digital Evidence Examination Guidelines
24.1 Preparation
24.2 Processing
24.3 Identify and Process Special Files
24.4 Summary
References
Bibliography
CASES
Glossary
D-M
N-S
T-W
Author Index
Index
Index_C
Index_D
Index_F
Index_G
Index_H
Index_J
Index_K
Index_L
Index_M
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Subject Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
List of Case Examples
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279
Authors:
Eoghan Casey BS MA
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Text File
Retrieving Hierarchical Data into a DataSet
Displaying Columns from a Related DataTable
Exporting the Results of a Query as a String
Adding Tables to a Database
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Creating Indexes for Fast Data Retrieval
Understanding SQL Subqueries
Working with Data BLOBs and Text
FileMaker Pro 8: The Missing Manual
Creating Related Records
Connecting Databases
Working with Records
Organizing Complex Scripts
The Database Design Report
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
Internet Protocol (IP) Basics
Dynamic Host Configuration Protocol (DHCP) Server Service
Domain Name System (DNS)
Windows Internet Name Service (WINS)
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Answers and Explanations
Project PlanningCore Processes
Answers and Explanations
Project Control
InDesign Type: Professional Typography with Adobe InDesign CS2
Fractions
Centering Type
Paragraph Indents
Creating a Table
Gradient Type
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies