NLSUI OPAC header image
Amazon cover image
Image from Amazon.com

Digital forensics explained

By: Contributor(s):
Publication details: London CRC Press 2013Description: 176p xxiISBN:
  • 9781439874950
Subject(s): DDC classification:
  • 363.250285 GOG
Contents:
Table of contents What Is Digital Forensics and What Should You Know about It? Introduction Forensic Science What Does It Take to Be a Digital Forensic Investigator? Educational Opportunities What Opportunities Are There for Digital Forensic Investigators? What Are the Trends and Challenges in Digital Forensics? Resources Available to Digital Forensic Investigators Conclusion References Digital Forensic Approaches and Best Practices Introduction First Response Responding to a Case Conclusion References Other Useful References Digital Forensics Tool Kit Introduction Computer Forensics Write Blockers Imaging Add-Ons and Other Technologies Tools Mobile Forensics Tools Visual Analysis Secured Storage Damaged Media Summary Internet and E-Mail Examinations Introduction E-mail Chat and Messaging Logs Peer to Peer Search Engine Activity Internet History Social Networking and Gaming Malware and Viruses Summary Mobile Forensics Introduction Mobile Phone Technology How a Call Is Made Forensic Challenges Forensic Process Digital Cell Phone Investigation Geographic Positioning Systems Cameras Summary Cellular Communications Technology Overview References Cloud Computing and Digital Forensics, Prof. Gerald Emerick Introduction Infrastructure as a Service Platform as a Service Software as a Service Service and Deployment Models Customer versus Cloud Provider Responsibilities Other Service Models Multi-Tenancy User Access and Provisioning Data Protection and Breaches Information Technology and Information Security Governance and Change Control Processes Service Access Vulnerabilities Migration Planning Incident Response Virtualization Security Benefits of Cloud Incident Response, Det . Jason Otting Introduction Case Summary The Initiation of an Investigation Information Evidence Gathering Interviews and the Analyzing of Evidence Analyzing the Electronic Evidence Prosecution and Testimony Things to Consider Conclusion Report Writing and Presentation Introduction Report Content and Considerations Sample Reports Presenting and Testifying Archiving Summary Social Media Forensics, Dr. Barbara L. Ciaramitaro Introduction to Social Media Social Networking E-mail Blogs Microblogs Event Coordination Location Identification Multimedia Sharing Search Wikis Web Conferencing Virtual Worlds Social Media Forensics Street Gangs Terrorist Activity White Collar Crimes Summary References Social Engineering Forensics, Dr. Barbara L. Ciaramitaro Introduction to Social Engineering Online Social Engineering Attacks Telephone Social Engineering Attacks Waste Management Social Engineering Attacks Mobile Device Social Engineering Attacks Personal Social Engineering Attacks Reverse Social Engineering Attacks Social Engineering Forensics Social Engineering Attack Vector Vulnerabilities Conclusion References Anti -Forensics, Prof. Velislav Pavlov Anti-Forensic Definition and Concepts Anti-Forensic Methods Eliminate Trails Hide Evidence Destroy Evidence Mobile Anti-Forensics Conclusion References Link and Visual Analysis Introduction Link and Visual Analysis Conclusion Psychological, Ethical, and Cultural Implications of Digital Forensics Introduction Psychological Implications of Digital Forensics Ethical Implications of Digital Forensics Cultural Implications Conclusion References Index
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
BOOKs BOOKs National Law School 363.250285 GOG (Browse shelf(Opens below)) Available 34178

Table of contents
What Is Digital Forensics and What Should You Know about It?
Introduction
Forensic Science
What Does It Take to Be a Digital Forensic Investigator?
Educational Opportunities
What Opportunities Are There for Digital Forensic Investigators?
What Are the Trends and Challenges in Digital Forensics?
Resources Available to Digital Forensic Investigators
Conclusion
References

Digital Forensic Approaches and Best Practices
Introduction
First Response
Responding to a Case
Conclusion
References
Other Useful References

Digital Forensics Tool Kit
Introduction
Computer Forensics
Write Blockers
Imaging
Add-Ons and Other Technologies
Tools
Mobile Forensics Tools
Visual Analysis
Secured Storage
Damaged Media
Summary

Internet and E-Mail Examinations
Introduction
E-mail
Chat and Messaging Logs
Peer to Peer
Search Engine Activity
Internet History
Social Networking and Gaming
Malware and Viruses
Summary

Mobile Forensics
Introduction
Mobile Phone Technology
How a Call Is Made
Forensic Challenges
Forensic Process
Digital Cell Phone Investigation
Geographic Positioning Systems
Cameras
Summary
Cellular Communications Technology Overview
References

Cloud Computing and Digital Forensics, Prof. Gerald Emerick
Introduction
Infrastructure as a Service
Platform as a Service
Software as a Service
Service and Deployment Models
Customer versus Cloud Provider Responsibilities
Other Service Models
Multi-Tenancy
User Access and Provisioning
Data Protection and Breaches
Information Technology and Information Security Governance and Change Control Processes
Service Access Vulnerabilities
Migration Planning
Incident Response
Virtualization
Security Benefits of Cloud

Incident Response, Det . Jason Otting
Introduction
Case Summary
The Initiation of an Investigation
Information
Evidence Gathering
Interviews and the Analyzing of Evidence
Analyzing the Electronic Evidence
Prosecution and Testimony
Things to Consider
Conclusion



Report Writing and Presentation
Introduction
Report Content and Considerations
Sample Reports
Presenting and Testifying
Archiving
Summary

Social Media Forensics, Dr. Barbara L. Ciaramitaro
Introduction to Social Media
Social Networking
E-mail
Blogs
Microblogs
Event Coordination
Location Identification
Multimedia Sharing
Search
Wikis
Web Conferencing
Virtual Worlds
Social Media Forensics
Street Gangs
Terrorist Activity
White Collar Crimes
Summary
References

Social Engineering Forensics, Dr. Barbara L. Ciaramitaro
Introduction to Social Engineering
Online Social Engineering Attacks
Telephone Social Engineering Attacks
Waste Management Social Engineering Attacks
Mobile Device Social Engineering Attacks
Personal Social Engineering Attacks
Reverse Social Engineering Attacks
Social Engineering Forensics
Social Engineering Attack Vector Vulnerabilities
Conclusion
References

Anti -Forensics, Prof. Velislav Pavlov
Anti-Forensic Definition and Concepts
Anti-Forensic Methods
Eliminate Trails
Hide Evidence
Destroy Evidence
Mobile Anti-Forensics
Conclusion
References

Link and Visual Analysis
Introduction
Link and Visual Analysis
Conclusion

Psychological, Ethical, and Cultural Implications of Digital Forensics
Introduction
Psychological Implications of Digital Forensics
Ethical Implications of Digital Forensics
Cultural Implications
Conclusion
References

Index

There are no comments on this title.

to post a comment.