List of Sidebars


Chapter 1: The Need for Computer Forensics

Real World Scenario-Tales from the Trenches: Why Computer Forensics Is Important

Chapter 2: Preparation-What to Do Before You Start

John Deutch
Real World Scenario-Tales from the Trenches: Preparation War Story
Real World Scenario-Former Employee of Local Internet Service Provider Sentenced to Prison for Computer Attack
Real World Scenario-Key Logging Scam Targets Bank Users

Chapter 3: Computer Evidence

Hot Java, Cold Jury
Real World Scenario-Tales from the Trenches: Computer Evidence
Software and Hardware Write Blockers

Chapter 4: Common Tasks

Who Will Use the Evidence You Collect?
What Else Can Hardware Tell You?
Real World Scenario-Tales from the Trenches: The Missing Man
Proving a Forensic Tool Is Safe

Chapter 5: Capturing the Data Image

Real World Scenario-Tales from the Trenches: Imaging

Chapter 6: Extracting Information from Data

IP Address Classes
Real World Scenario-The Case of Exposed Data
Real World Scenario-Tales from the Trenches: Hidden Evidence

Chapter 7: Passwords and Encryption

Real World Scenario-Who Are You, Really?
Real World Scenario-The Contract Ends Now!
Unauthorized Password Cracking is Illegal
Real World Scenario-Keeping Secrets
Real World Scenario-Tales from the Trenches: Opening Encrypted Files

Chapter 8: Common Forensics Tools

To Copy or Not to Copy?
Real World Scenario-Tales from the Trenches: Forensics Tools

Chapter 9: Pulling It All Together

Real World Scenario-Tales from the Trenches: Reports
Hacker Acquitted
Case #234-NextGard Technology Copyright Piracy Summary

Chapter 10: How to Testify in Court

Conflict of Interest
Real World Scenario-Tales from the Trenches: Testimony

Appendix C: Forensics Certifications

The Top Five Computer Forensics Certifications



Computer Forensics JumpStart
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net