Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,
collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.
This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.
The accompanying CD-ROM contains simulated cases that integrate many of the topics covered in the text, teaching individuals about:
* Includes CD-ROM multimedia appendix containing simulated cases
* Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence
* Offers readers information about relevant legal issues
* Features coverage of the abuse of computer networks and privacy and security issues on computer networks
"synopsis" may belong to another edition of this title.
Eoghan Casey is founding partner of cmdLabs, author of the foundational book Digital Evidence and Computer Crime, and coauthor of Malware Forensics. For over a decade, he has dedicated himself to advancing the practice of incident handling and digital forensics. He helps client organizations handle security breaches and analyzes digital evidence in a wide range of investigations, including network intrusions with international scope. He has testified in civil and criminal cases, and has submitted expert reports and prepared trial exhibits for computer forensic and cyber-crime cases. Eoghan has performed thousands of forensic acquisitions and examinations, including Windows and UNIX systems, Enterprise servers, smart phones, cell phones, network logs, backup tapes, and database systems. He has performed vulnerability assessments, deployed and maintained intrusion detection systems, firewalls and public key infrastructures, and developed policies, procedures, and educational programs for a variety of organizations. In addition, he conducts research and teaches graduate students at Johns Hopkins University Information Security Institute, is editor of the Handbook of Digital Forensics and Investigation, and is Editor-in-Chief of Elsevier's International Journal of Digital Investigation.
It details the application of forensic science principles to the location, recovery, and examination of digital evidence...Each chapter in the book is fully supported by case examples to clarify particular points made. It also contains many references to specialized literature and on-line resources as well as a helpful glossary of terms...this book can be recommended mainly for people looking to expand their general knowledge and awareness of computer crime and the process of computer crime investigation, particularly those just entering the field of digital forensics."
--Dr. L.W. Russell, SCIENCE & JUSTICE
"This is the right book for the times."
--Lori Fenna, Chair, ELECTRONIC FRONTIER FOUNDATION
". . . I highly recommend it for anybody who is just entering the field of digital forensics. This book has many fine features, including coverage of the basics of criminal investigation, legal issues in digital forensics, and of course, the technical information you need to get started in the field and understand what the experts are talking about. It covers the who, what, why, when, where, and how of digital evidence, addresses means, motive, and opportunity, and addresses the big picture issues very well . . . Regardless of whether your background is in the law, criminal investigation, or computers, this book is a useful resource. I was particularly enamored with the number of examples included in the book. These case studies and situational demonstrations bring the book to life and add meaning that you can't get from a dry academic book . . . Casey goes on to include an extensive glossary, excellent citations, a useful index, sample printouts, URLs of well known sites, and a multimedia supplement. All told, this book does a fine job of introducing the area and provides a useful resource for the active practitioner."
--Fred Cohen, SANDIA NATIONAL LABORATORY, LIVERMORE, CALIFORNIA, USA
Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively.
The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.
Features
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Bk&CD Rom. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 269853-6
Quantity: 2 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. Bk&CD Rom. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 269853-6
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Hardcover. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 0.1. Seller Inventory # G012162885XI3N00
Quantity: 1 available
Seller: Goldstone Books, Llandybie, United Kingdom
hardcover. Condition: Very Good. All orders are dispatched within one working day from our UK warehouse. We've been selling books online since 2004! We have over 750,000 books in stock. No quibble refund if not completely satisfied. Seller Inventory # mon0007365985
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. Digital evidence - evidence that is stored on or transmitted by computers - can play a major role in a wide range of crimes. Though an increasing number of criminals are using computers and computer networks, few investigators are well versed in the evidently, technical and legal issues related to digital evidence. This book explains how computer networks function, how they can be involved in crime and how they can be used as a source of evidence. Readers will learn about relevant legal issues and ber introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR001894021
Quantity: 2 available
Seller: Kloof Booksellers & Scientia Verlag, Amsterdam, Netherlands
Condition: as new. San Diego : Academic Press, 1999. Hardcover. 320 pp. Includes CD-ROM. Condition : as new copy. ISBN 9780121628857. Keywords : RECHT, Seller Inventory # 41090
Quantity: 1 available
Seller: Reiner Books, Minneapolis, MN, U.S.A.
Hardcover. Condition: Near Fine. ] Hardback, squarish octavo, appx 7 1/2 x 10 inches, white titling on black/green glossy illustrated covers, xvi + 279 pages, Near Fine/no dj (probably as issued). Binding snug, entirely clean inside and out, scant signs of any wear at all. CD enclosed in unopened plastic envelope affixed to rear pastedown. Numerous graphs and tables. References each chapter + Appendices, Glossary, Author Index, Subject Index. RWR5 Computers Science Technology Media True Crime Cybercrime Law Search & Seizure. Seller Inventory # 06168
Quantity: 1 available
Seller: Bingo Used Books, Vancouver, WA, U.S.A.
Hardcover. Condition: Very Good. hardback in very good+ condition. name inside cover otherwise clean. Seller Inventory # 15659
Quantity: 1 available
Seller: The Book Spot, Sioux Falls, MN, U.S.A.
Hardcover. Condition: New. Seller Inventory # Abebooks574579
Quantity: 1 available