1 option
Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes / Albert J. Marcella, Robert S. Greenfield, editors.
Van Pelt Library HV8079.C65 C93 2002
By Request
- Format:
- Book
- Language:
- English
- Subjects (All):
- Computer crimes--Investigation--Handbooks, manuals, etc.
- Computer crimes.
- Computer crimes--Investigation.
- Genre:
- Handbooks and manuals.
- Physical Description:
- xx, 443 pages : illustrations ; 26 cm
- Place of Publication:
- Boca Raton, Fla. : Auerbach Publications, [2002]
- Summary:
- Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.
- Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look behind the closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.
- Contents:
- Section I Cyber Forensics
- 1 The Goal of the Forensic Investigation / Carol Stucki 3
- 2 How to Begin a Nonliturgical Forensic Investigation / Carol Stucki 19
- 3 The Liturgical Forensic Examination: Tracing Activity on a Windows-Based Desktop / Robert S. Greenfield 47
- 4 Basics of Internet Abuse: What Is Possible and Where to Look Under the Hood / John W. Rado 79
- 5 Tools of the Trade: Automated Tools Used to Secure a System Throughout the Stages of a Forensic Investigation / Brent Deterdeing 97
- 6 Network Intrusion Management and Profiling / Steven Schlarman 117
- 7 Cyber Forensics and the Legal System / Abigail Abraham 133
- Section II Federal and International Guidelines
- 8 Searching and Seizing Computers and Obtaining Electronic Evidence 149
- 9 Computer Crime Policy and Programs 179
- 10 International Aspects of Computer Crime 205
- 11 Privacy Issues in the High-Tech Context / The Department of Justice Privacy Council 221
- 12 Critical Infrastructure Protection 227
- 13 Electronic Commerce: Legal Issues / The Electronic Commerce Working Group (ECWG), Department of Justice 249
- 14 Legal Considerations in Designing and Implementing Electronic Processes: A Guide for Federal Agencies 287
- 15 Encryption 335
- 16 Intellectual Property 361
- Section III Forensics Tools
- 17 Forensic and Security Assessment Tools 375
- 18 How to Report Internet-Related Crime 389
- 19 Internet Security: An Auditor's Basic Checklist 391.
- Notes:
- Includes bibliographical references (pages 415-423) and index.
- Local Notes:
- Acquired for the Penn Libraries with assistance from the Harry E. Humphreys Book Fund.
- ISBN:
- 0849309557
- OCLC:
- 48140454
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.