
Computer Forensics: Computer Crime Scene Investigation
by Vacca, John R.-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Buy New
Rent Textbook
Used Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
Summary
Table of Contents
ChapterChapter 1 Computer Forensics Fundamentals
ChapterChapter 2 Types of Computer Forensics Technology
ChapterChapter 3 Types of Computer Forensics Systems
ChapterChapter 4 Types of Vendor and Computer Forensics Services
PartPart 2 Computer Forensics Investigations
ChapterChapter 5 Handling Preliminary Investigations
ChapterChapter 6 Controlling an Investigation
ChapterChapter 7 Investigating Information-Hiding Techniques
ChapterChapter 8 Investigating and Scrutinizing E-Mail
PartPart 3 Computer Forensics Evidence and Capture
ChapterChapter 9 Conducting Disk-Based Analysis
ChapterChapter 10 Data Recovery
ChapterChapter 11 Evidence Collection and Data Seizure
ChapterChapter 12 Duplication and Preservation of Digital Evidence
ChapterChapter 13 Computer Image Verification and Authentication
PartPart 4 Computer Forensics Analysis
ChapterChapter 14 Discovery of Electronic Evidence
ChapterChapter 15 Identification of Data
ChapterChapter 16 Reconstructing Past Events
ChapterChapter 17 Networks
PartPart 5 Countermeasures: Cyberwarfare
ChapterChapter 18 Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
ChapterChapter 19 The Cyberwarfare Arsenal and Tactics of the Military
ChapterChapter 20 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
ChapterChapter 21 The Information Warfare Arsenal and Tactics of Private Companies
ChapterChapter 22 The Cyberwarfare Arsenal of the Future
ChapterChapter 23 Surveillance Tools for Cyberwarfare of the Future
ChapterChapter 24 Civilian Causalities: The Victims and Refugees of Cyberwarfare
PartPart 6 Real-time and Advanced Computer Forensics Systems and Future Directions
ChapterChapter 25 Searching Memory in Real Time
ChapterChapter 26 Advanced Computer Forensics
ChapterChapter 27 Summary, Conclusions, and Recommendations
PartPart 7 Appendices
AppendixAppendix A Frequently Asked Questions
AppendixAppendix B Computer Forensics Resources
AppendixAppendix C Links to Computer Forensics and Related Law Enforcement Web Pages
AppendixAppendix D More Computer Forensics Cases
AppendixAppendix E Securing Windows 2003 and Vista Environment: Hands-On
AppendixAppendix F Patching Microsoft Environments: Hands-On
AppendixAppendix G Answers to Review Questions/Exercises, Hands-on Projects, Case Projects, and Optional Team Case Project by Chapter
AppendixAppendix H Checklists by Chapter
AppendixAppendix I About the CD-ROM
AppendixAppendix J Glossary of Terms and Acronyms
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.