Table of Contents

 

 < Day Day Up > 



computer forensics: computer crime scene investigation
Computer Forensics: Computer Crime Scene Investigation
by John R. Vacca  ISBN:1584500182
Charles River Media © 2002 (731 pages)

This guide offers advice on how to gather evidence of a hack attack after the fact, and a lot of general-interest information on the state of crime and law enforcement in computer technology.

 
Table of Contents
Computer Forensics—Computer Crime Scene Investigation
Foreword
Introduction
Part I - Overview of Computer Forensics Technology
Chapter 1- Computer Forensics Fundamentals
Chapter 2- Types of Computer Forensics Technology
Chapter 3- Types of Vendor and Computer Forensics Services
Part II - Computer Forensics Evidence and Capture
Chapter 4- Data Recovery
Chapter 5- Evidence Collection and Data Seizure
Chapter 6- Duplication and Preservation of Digital Evidence
Chapter 7- Computer Image Verification and Authentication
Part III - Computer Forensics Analysis
Chapter 8- Discovery of Electronic Evidence
Chapter 9- Identification of Data
Chapter 10- Reconstructing Past Events
Chapter 11- Networks
Part IV - Countermeasures—Information Warfare
Chapter 12- Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
Chapter 13- The Information Warfare Arsenal and Tactics of the Military
Chapter 14- The Information Warfare Arsenal and Tactics of Terrorists and Rogues
Chapter 15- The Information Warfare Arsenal and Tactics of Private Companies
Chapter 16- Information Warfare: Arsenal of the Future
Chapter 17- Surveillance Tools for Information Warfare of the Future
Chapter 18- Civilian Casualties—The Victims and Refugees of Information Warfare
Part V - Results and Future Directions
Chapter 19- Advanced Computer Forensics
Chapter 20- Summary, Conclusions, and Recommendations
Part VI - Appendices
Appendix A- Frequently Asked Questions
Appendix B- Computer Forensics Resources
Appendix C- Links to Computer Forensics and Related Law Enforcement Web Pages
Appendix D- More Computer Forensics Cases
Appendix E- On the CD-ROM
Glossary of- Terms and Acronyms
Index
List of Figures
List of Tables
List of Sidebars


 

 < Day Day Up > 

 < Day Day Up > 



Back Cover

Terrorist attacks are no longer relegated to airports and federal buildings. Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book provides a complete overview of computer forensics from its definition to “crime scene investigation,” seizure of data, determining the “fingerprints” of the crime, and tracking down the criminal. The book focuses on “solving the crime” rather than information security.

KEY FEATURES

  • Comprehensive overview of the subject from definition to data recovery techniques to auditing methods to terrorist cyber-attacks
  • Case studies and vignettes of actual computer crimes
  • Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the U.S. Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics: The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Case Studies and Vignettes

About the Author

John Vacca served as a computer security official with NASA, and he has written over 35 books on computer-related topics, including Satellite Encryption (AP), Net Privacy (McG-H), and Electronic Commerce 3/E (CRM).



 < Day Day Up >