Flylib.com
Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279
Authors:
Eoghan Casey BS MA
BUY ON AMAZON
BackCover
BackCover
Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, Second Edition
Introduction
Reliability of Digital Evidence
The Need for Standardization
Roadmap to the Book
Disclaimer
Part 1: Digital Investigation
Chapter 1: Digital Evidence and Computer Crime
1.1 Digital Evidence
1.2 Increasing Awareness of Digital Evidence
1.3 Challenging Aspects of Digital Evidence
1.4 Following the Cybertrail
1.5 Challenging Aspects of the Cybertrail
1.6 Forensic Science and Digital Evidence
1.7 Summary
References
Cases
Chapter 2: History and Terminology of Computer Crime Investigation
2.1 Brief History of Computer Crime Investigation
2.2 Evolution of Investigative Tools
2.3 Language of Computer Crime Investigation
2.4 Summary
References
Cases
Chapter 3: Technology and Law
Part A Technology and Law - A Us Perspective
3A.1 Jurisdiction
3A.2 Pornography and Obscenity
3A.3 Privacy
3A.4 Copyrights and the Theft of Digital Intellectual Property
Part B Computer Misuse in America
Part C Technology and Criminal Law - A European Perspective
3C.1 Overview of Criminal Offenses
3C.2 Search and Seizure
3C.3 Jurisdiction and Extradition
3C.4 Penalties
3C.5 Privacy
3C.6 Summary
United States Perspective Bibliography
Legislation
References
European Perspective BibliographySuggested Further Reading
Legislation
References
Chapter 4: The Investigative Process
4.1 The Role of Digital Evidence
4.2 Investigative Methodology
4.3 Summary
References
Cases
Chapter 5: Investigative Reconstruction with Digital Evidence
5.1 Equivocal Forensic Analysis
5.2 Victimology
5.3 Crime Scene Characteristics
5.4 Evidence Dynamics and the Introduction of Error
5.5 Reporting
5.6 Summary
References
Cases
Chapter 6: Modus Operandi, Motive, and Technology
6.1 Axes to Pathological Criminals, and Other Unintended Consequences
6.2 Modus Operandi
6.3 Technology and Modus Operandi
6.4 Motive and Technology
6.5 Current Technologies
6.6 Summary
References
Chapter 7: Digital Evidence in the Courtroom
7.1 Admissibility - Warrants
7.2 Authenticity and Reliability
7.3 Casey s Certainty Scale
7.4 Best Evidence
7.5 Direct versus Circumstantial Evidence
7.6 Hearsay
7.7 Scientific Evidence
7.8 Presenting Digital Evidence
7.9 Summary
References
Cases
Part 2: Computers
Chapter 8: Computer Basics for Digital Investigators
8.2 Basic Operation of Computers
8.3 Representation of Data
8.4 Storage Media and Data Hiding
8.5 File Systems and Location of Data
8.6 Overview of Encryption
8.7 Summary
References
Cases
Chapter 9: Applying Forensic Science to Computers
9.1 Authorization and Preparation
9.2 Identification
9.3 Documentation
9.4 Collection and Preservation
9.5 Examination and Analysis
9.6 Reconstruction
9.7 Reporting
9.8 Summary
References
Cases
Chapter 10: Forensic Examination of Windows Systems
10.1 Windows Evidence Acquisition Boot Disk
10.2 File Systems
10.3 Overview of Digital Evidence Processing Tools
10.4 Data Recovery
10.5 Log Files
10.6 File System Traces
10.7 Registry
10.8 Internet Traces
10.9 Program Analysis
10.10 Summary
References
Cases
Chapter 11: Forensic Examination of Unix Systems
11.1 Unix Evidence Acquisition Boot Disk
11.2 File Systems
11.3 Overview of Digital Evidence Processing Tools
11.4 Data Recovery
11.5 Log Files
11.6 File System Traces
11.7 Internet Traces
11.8 Summary
References
Chapter 12: Forensic Examination of Macintosh Systems
12.2 Overview of Digital Evidence Processing Tools
12.3 Data Recovery
12.4 File System Traces
12.5 Internet Traces
12.6 Summary
Chapter 13: Forensic Examination of Handheld Devices
13.1 Overview of Handheld Devices
13.2 Collection and Examination of Handheld Devices
13.3 Dealing with Password Protection and Encryption
13.4 Related Sources of Digital Evidence
13.5 Summary
References
Cases
Part 3: Networks
Chapter 14: Network Basics for Digital Investigators
14.1 A Brief History of Computer Networks
14.2 Technical Overview of Networks
14.3 Network Technologies
14.4 Connecting Networks using Internet Protocols
14.5 Summary
References
Cases
Chapter 15: Applying Forensic Science to Networks
15.1 Preparation and Authorization
15.2 Identification
15.3 Documentation, Collection, and Preservation
15.4 Filtering and Data Reduction
15.5 ClassIndividual Characteristics and Evaluation of Source
15.6 Evidence Recovery
15.7 Investigative Reconstruction
15.8 Reporting Results
15.9 Summary
References
Cases
Chapter 16: Digital Evidence on Physical and Data-Link Layers
16.1 Ethernet
16.2 Linking the Data-Link and Network Layers - Encapsulation
16.3 Ethernet versus ATM Networks
16.4 Documentation, Collection, and Preservation
16.5 Analysis Tools and Techniques
16.6 Summary
References
Chapter 17: Digital Evidence at the Network and Transport Layers
17.1 TCPIP
17.2 Setting up a Network
17.3 TCPIP Related Digital Evidence
17.4 Summary
References
Chapter 18: Digital Evidence on the Internet
18.1 Role of the Internet in Criminal Investigations
18.2 Internet Services: Legitimate versus Criminal Uses
18.3 Using the Internet as an Investigative Tool
18.4 Online Anonymity and Self-Protection
18.5 E-Mail Forgery and Tracking
18.6 Usenet Forgery and Tracking
18.7 Searching and Tracking on IRC
18.8 Summary
References
Cases
Part 4: Investigating Computer Crime
Chapter 19: Investigating Computer Intrusions
19.1 How Computer Intruders Operate
19.2 Investigating Intrusions
19.3 Investigative Reconstruction
19.4 Detailed Case Example
19.5 Summary
References
Chapter 20: Sex Offenders on the Internet
20.1 Window to the World
20.2 Legal Considerations
20.3 Identifying and Processing Digital Evidence
20.4 Investigating Online Sexual Offenders
20.5 Investigative Reconstruction
20.6 Summary
References
Cases
Chapter 21: Cyberstalking
21.1 How Cyberstalkers Operate
21.2 Investigating Cyberstalking
21.3 Cyberstalking Case Example
21.4 Summary
References
Chapter 22: Digital Evidence as Alibi
22.1 Investigating an Alibi
22.2 Time as Alibi
22.3 Location as Alibi
22.4 Summary
Part 5: Guidelines
Chapter 23: Digital Evidence Handling Guidelines
23.1 Identification or Seizure
23.2 Preservation
Chapter 24: Digital Evidence Examination Guidelines
24.1 Preparation
24.2 Processing
24.3 Identify and Process Special Files
24.4 Summary
References
Bibliography
CASES
Glossary
D-M
N-S
T-W
Author Index
Index
Index_C
Index_D
Index_F
Index_G
Index_H
Index_J
Index_K
Index_L
Index_M
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Subject Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
List of Case Examples
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279
Authors:
Eoghan Casey BS MA
BUY ON AMAZON
SQL Hacks
Hack 13. Choose the Right Join Style for Your Relationships
Hack 49. Keep Track of Infrequently Changing Values
Hack 76. Compress to Avoid LOBs
Hack 80. Play Six Degrees of Kevin Bacon
Hack 88. Test Two Values from a Subquery
C++ How to Program (5th Edition)
Self-Review Exercises
Introduction to C++ Standard Library Class Template vector
Terminology
Searching Algorithms
E.12. Unions
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
PostgreSQL SQL Syntax and Use
Using PostgreSQL from an ODBC Client Application
Client 1Connecting to the Server
Other Features
Client 2Query Processing
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Creating a Search Engine with Lucene
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Success Story #2 Bank One Bigger… Now Better
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Phase 4 Performance and Control
Raising the Stakes in Service Process Improvement
FileMaker 8 Functions and Scripts Desk Reference
Get(FileName)
Length()
Min()
About FileMaker and XML
Query Parameters for XML/XSLT URL Requests
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies