Digital Evidence and Computer Crime Forensic Science, Computers and The Internet 2nd Ed [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Digital Evidence and Computer Crime Forensic Science, Computers and The Internet 2nd Ed [Electronic resources] - نسخه متنی

Eoghan Casey

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید










  • Sitemap

    Table of Contents

    BackCover

    Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, Second Edition

    Introduction

    Reliability of Digital Evidence

    The Need for Standardization

    Roadmap to the Book

    Disclaimer

    Part 1: Digital Investigation

    Chapter 1: Digital Evidence and Computer Crime

    1.1 Digital Evidence

    1.2 Increasing Awareness of Digital Evidence

    1.3 Challenging Aspects of Digital Evidence

    1.4 Following the Cybertrail

    1.5 Challenging Aspects of the Cybertrail

    1.6 Forensic Science and Digital Evidence

    1.7 Summary

    References

    Cases

    Chapter 2: History and Terminology of Computer Crime Investigation

    2.1 Brief History of Computer Crime Investigation

    2.2 Evolution of Investigative Tools

    2.3 Language of Computer Crime Investigation

    2.4 Summary

    References

    Cases

    Chapter 3: Technology and Law

    Part A Technology and Law - A Us Perspective

    3A.1 Jurisdiction

    3A.2 Pornography and Obscenity

    3A.3 Privacy

    3A.4 Copyrights and the " Theft " of Digital Intellectual Property

    Part B Computer Misuse in America

    Part C Technology and Criminal Law - A European Perspective

    3C.1 Overview of Criminal Offenses

    3C.2 Search and Seizure

    3C.3 Jurisdiction and Extradition

    3C.4 Penalties

    3C.5 Privacy

    3C.6 Summary

    United States Perspective Bibliography

    Legislation

    References

    European Perspective Bibliography/Suggested Further Reading

    Legislation

    References

    Chapter 4: The Investigative Process

    4.1 The Role of Digital Evidence

    4.2 Investigative Methodology

    4.3 Summary

    References

    Cases

    Chapter 5: Investigative Reconstruction with Digital Evidence

    5.1 Equivocal Forensic Analysis

    5.2 Victimology

    5.3 Crime Scene Characteristics

    5.4 Evidence Dynamics and the Introduction of Error

    5.5 Reporting

    5.6 Summary

    References

    Cases

    Chapter 6: Modus Operandi, Motive, and Technology

    6.1 Axes to Pathological Criminals, and Other Unintended Consequences

    6.2 Modus Operandi

    6.3 Technology and Modus Operandi

    6.4 Motive and Technology

    6.5 Current Technologies

    6.6 Summary

    References

    Chapter 7: Digital Evidence in the Courtroom

    7.1 Admissibility - Warrants

    7.2 Authenticity and Reliability

    7.3 Casey''s Certainty Scale

    7.4 Best Evidence

    7.5 Direct versus Circumstantial Evidence

    7.6 Hearsay

    7.7 Scientific Evidence

    7.8 Presenting Digital Evidence

    7.9 Summary

    References

    Cases

    Part 2: Computers

    Chapter 8: Computer Basics for Digital Investigators

    8.2 Basic Operation of Computers

    8.3 Representation of Data

    8.4 Storage Media and Data Hiding

    8.5 File Systems and Location of Data

    8.6 Overview of Encryption

    8.7 Summary

    References

    Cases

    Chapter 9: Applying Forensic Science to Computers

    9.1 Authorization and Preparation

    9.2 Identification

    9.3 Documentation

    9.4 Collection and Preservation

    9.5 Examination and Analysis

    9.6 Reconstruction

    9.7 Reporting

    9.8 Summary

    References

    Cases

    Chapter 10: Forensic Examination of Windows Systems

    10.1 Windows Evidence Acquisition Boot Disk

    10.2 File Systems

    10.3 Overview of Digital Evidence Processing Tools

    10.4 Data Recovery

    10.5 Log Files

    10.6 File System Traces

    10.7 Registry

    10.8 Internet Traces

    10.9 Program Analysis

    10.10 Summary

    References

    Cases

    Chapter 11: Forensic Examination of Unix Systems

    11.1 Unix Evidence Acquisition Boot Disk

    11.2 File Systems

    11.3 Overview of Digital Evidence Processing Tools

    11.4 Data Recovery

    11.5 Log Files

    11.6 File System Traces

    11.7 Internet Traces

    11.8 Summary

    References

    Chapter 12: Forensic Examination of Macintosh Systems

    12.2 Overview of Digital Evidence Processing Tools

    12.3 Data Recovery

    12.4 File System Traces

    12.5 Internet Traces

    12.6 Summary

    Chapter 13: Forensic Examination of Handheld Devices

    13.1 Overview of Handheld Devices

    13.2 Collection and Examination of Handheld Devices

    13.3 Dealing with Password Protection and Encryption

    13.4 Related Sources of Digital Evidence

    13.5 Summary

    References

    Cases

    Part 3: Networks

    Chapter 14: Network Basics for Digital Investigators

    14.1 A Brief History of Computer Networks

    14.2 Technical Overview of Networks

    14.3 Network Technologies

    14.4 Connecting Networks using Internet Protocols

    14.5 Summary

    References

    Cases

    Chapter 15: Applying Forensic Science to Networks

    15.1 Preparation and Authorization

    15.2 Identification

    15.3 Documentation, Collection, and Preservation

    15.4 Filtering and Data Reduction

    15.5 Class/Individual Characteristics and Evaluation of Source

    15.6 Evidence Recovery

    15.7 Investigative Reconstruction

    15.8 Reporting Results

    15.9 Summary

    References

    Cases

    Chapter 16: Digital Evidence on Physical and Data-Link Layers

    16.1 Ethernet

    16.2 Linking the Data-Link and Network Layers - Encapsulation

    16.3 Ethernet versus ATM Networks

    16.4 Documentation, Collection, and Preservation

    16.5 Analysis Tools and Techniques

    16.6 Summary

    References

    Chapter 17: Digital Evidence at the Network and Transport Layers

    17.1 TCP/IP

    17.2 Setting up a Network

    17.3 TCP/IP Related Digital Evidence

    17.4 Summary

    References

    Chapter 18: Digital Evidence on the Internet

    18.1 Role of the Internet in Criminal Investigations

    18.2 Internet Services: Legitimate versus Criminal Uses

    18.3 Using the Internet as an Investigative Tool

    18.4 Online Anonymity and Self-Protection

    18.5 E-Mail Forgery and Tracking

    18.6 Usenet Forgery and Tracking

    18.7 Searching and Tracking on IRC

    18.8 Summary

    References

    Cases

    Part 4: Investigating Computer Crime

    Chapter 19: Investigating Computer Intrusions

    19.1 How Computer Intruders Operate

    19.2 Investigating Intrusions

    19.3 Investigative Reconstruction

    19.4 Detailed Case Example

    19.5 Summary

    References

    Chapter 20: Sex Offenders on the Internet

    20.1 Window to the World

    20.2 Legal Considerations

    20.3 Identifying and Processing Digital Evidence

    20.4 Investigating Online Sexual Offenders

    20.5 Investigative Reconstruction

    20.6 Summary

    References

    Cases

    Chapter 21: Cyberstalking

    21.1 How Cyberstalkers Operate

    21.2 Investigating Cyberstalking

    21.3 Cyberstalking Case Example

    21.4 Summary

    References

    Chapter 22: Digital Evidence as Alibi

    22.1 Investigating an Alibi

    22.2 Time as Alibi

    22.3 Location as Alibi

    22.4 Summary

    Part 5: Guidelines

    Chapter 23: Digital Evidence Handling Guidelines

    23.1 Identification or Seizure

    23.2 Preservation

    Chapter 24: Digital Evidence Examination Guidelines

    24.1 Preparation

    24.2 Processing

    24.3 Identify and Process Special Files

    24.4 Summary

    References

    Bibliography

    CASES

    Glossary

    D-M

    N-S

    T-W

    Author Index

    Index

    Index_C

    Index_D

    Index_F

    Index_G

    Index_H

    Index_J

    Index_K

    Index_L

    Index_M

    Index_O

    Index_P

    Index_Q

    Index_R

    Index_S

    Index_T

    Index_U

    Index_V

    Index_W

    Subject Index

    Index_A

    Index_B

    Index_C

    Index_D

    Index_E

    Index_F

    Index_G

    Index_H

    Index_I

    Index_J

    Index_K

    Index_L

    Index_M

    Index_N

    Index_O

    Index_P

    Index_Q

    Index_R

    Index_S

    Index_T

    Index_U

    Index_V

    Index_W

    Index_X

    Index_Y

    Index_Z

    List of Figures

    List of Tables

    List of Case Examples



  • / 280