Computer Forensics: Computer Crime Scene Investigation

by
Edition: 3rd
Format: Paperback
Pub. Date: 2026-01-13
Publisher(s): Jones & Bartlett Learning
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $169.95

Buy New

Usually Ships in 5-7 Business Days
$169.78

Rent Textbook

Select for Price
There was a problem. Please try again later.

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

Summary

Despite efforts to safeguard sensitive data and networks, organizations today face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and includes fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organization with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised systems. It includes a comprehensive introduction to computer forensics investigative techniques and provides readers with the knowledge and skills required to conduct a computer forensics investigation from initial discovery to completion.  Readers will also learn how to exploit your organization's Computer Incident Response Team (CIRT); collect, manage, and record digital evidence; and leverage powerful software tools and techniques to uncover hidden or deleted information. Key topics include:  Responding to incidents and investigating computer crime, conducting and managing an investigation, performing disk-based analysis, investigating information-hiding techniques, examining e-mail, tracing internet access, searching memory in real-time, And The forensics challenge competition.

Table of Contents

PartPart 1 Overview of Computer Forensics Technology
ChapterChapter 1 Computer Forensics Fundamentals
ChapterChapter 2 Types of Computer Forensics Technology
ChapterChapter 3 Types of Computer Forensics Systems
ChapterChapter 4 Types of Vendor and Computer Forensics Services
PartPart 2 Computer Forensics Investigations
ChapterChapter 5 Handling Preliminary Investigations
ChapterChapter 6 Controlling an Investigation
ChapterChapter 7 Investigating Information-Hiding Techniques
ChapterChapter 8 Investigating and Scrutinizing E-Mail
PartPart 3 Computer Forensics Evidence and Capture
ChapterChapter 9 Conducting Disk-Based Analysis
ChapterChapter 10 Data Recovery
ChapterChapter 11 Evidence Collection and Data Seizure
ChapterChapter 12 Duplication and Preservation of Digital Evidence
ChapterChapter 13 Computer Image Verification and Authentication
PartPart 4 Computer Forensics Analysis
ChapterChapter 14 Discovery of Electronic Evidence
ChapterChapter 15 Identification of Data
ChapterChapter 16 Reconstructing Past Events
ChapterChapter 17 Networks
PartPart 5 Countermeasures: Cyberwarfare
ChapterChapter 18 Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
ChapterChapter 19 The Cyberwarfare Arsenal and Tactics of the Military
ChapterChapter 20 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
ChapterChapter 21 The Information Warfare Arsenal and Tactics of Private Companies
ChapterChapter 22 The Cyberwarfare Arsenal of the Future
ChapterChapter 23 Surveillance Tools for Cyberwarfare of the Future
ChapterChapter 24 Civilian Causalities: The Victims and Refugees of Cyberwarfare
PartPart 6 Real-time and Advanced Computer Forensics Systems and Future Directions
ChapterChapter 25 Searching Memory in Real Time
ChapterChapter 26 Advanced Computer Forensics
ChapterChapter 27 Summary, Conclusions, and Recommendations
PartPart 7 Appendices
AppendixAppendix A Frequently Asked Questions
AppendixAppendix B Computer Forensics Resources
AppendixAppendix C Links to Computer Forensics and Related Law Enforcement Web Pages
AppendixAppendix D More Computer Forensics Cases
AppendixAppendix E Securing Windows 2003 and Vista Environment: Hands-On
AppendixAppendix F Patching Microsoft Environments: Hands-On
AppendixAppendix G Answers to Review Questions/Exercises, Hands-on Projects, Case Projects, and Optional Team Case Project by Chapter
AppendixAppendix H Checklists by Chapter
AppendixAppendix I About the CD-ROM
AppendixAppendix J Glossary of Terms and Acronyms

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.