0%

Book Description

This completely revised reference work will concentrate on providing specific practical information in a well organized format. Each chapter will have a consistent structure, covering similar aspects of different systems when appropriate. In order to provide readers with the knowledge they will need, and to create a thorough understanding of how to utilize the widest range of digital evidence in vastly varying situations, this work is divided into two parts: Investigative Methodology and Forensic Analysis.

The Investigative Methodology section will provide guidance in how to conduct three distinct types of digital investigations: forensic analysis, e-discovery, intrusion investigation. This section will end with an objective discussion of the tools, describing tool evaluation and noting the limitations of forensic software.

The Forensic Analysis section will provide in-depth technical descriptions of digital evidence analysis in commonly encountered situations, starting with computers, moving on to networks, and culminating with embedded systems. This section will demonstrate how forensic science is applied in different technological contexts, providing investigators with technical information and guidance they can use at the crime scene. These technical chapters will focus on the recovery and analysis of digital evidence.


*Demonstrates how computer system usage leaves traces that are useful in investigations, how to locate digital evidence, how that evidence is created and what it means
*Furnishes forensic examiners with a range of tools to verify results
*Case examples in every chapter convey complex concepts, giving readers a sense of the technical, legal, and practical challenges that arise in real investigations

Book Description

This completely revised reference work will concentrate on providing specific practical information in a well organized format. Each chapter will have a consistent structure, covering similar aspects of different systems when appropriate. In order to provide readers with the knowledge they will need, and to create a thorough understanding of how to utilize the widest range of digital evidence in vastly varying situations, this work is divided into two parts: Investigative Methodology and Forensic Analysis.

The Investigative Methodology section will provide guidance in how to conduct three distinct types of digital investigations: forensic analysis, e-discovery, intrusion investigation. This section will end with an objective discussion of the tools, describing tool evaluation and noting the limitations of forensic software.

The Forensic Analysis section will provide in-depth technical descriptions of digital evidence analysis in commonly encountered situations, starting with computers, moving on to networks, and culminating with embedded systems. This section will demonstrate how forensic science is applied in different technological contexts, providing investigators with technical information and guidance they can use at the crime scene. These technical chapters will focus on the recovery and analysis of digital evidence.


*Demonstrates how computer system usage leaves traces that are useful in investigations, how to locate digital evidence, how that evidence is created and what it means
*Furnishes forensic examiners with a range of tools to verify results
*Case examples in every chapter convey complex concepts, giving readers a sense of the technical, legal, and practical challenges that arise in real investigations

Table of Contents

  1. Cover image
  2. Table of Contents
  3. Copyright
  4. Dedication
  5. Contributors
  6. Foreword
  7. About the Authors
  8. Acknowledgements
  9. Chapter 1. Introduction
  10. Chapter 2. Forensic Analysis
  11. Chapter 3. Electronic Discovery
  12. Chapter 4. Intrusion Investigation
  13. Chapter 5. Windows Forensic Analysis
  14. Chapter 6. UNIX Forensic Analysis
  15. Chapter 7. Macintosh Forensic Analysis
  16. Chapter 8. Embedded Systems Analysis
  17. Chapter 9. Network Investigations
  18. Chapter 10. Mobile Network Investigations
  19. Index