Digital forensics explained. (©2013)
- Record Type:
- Book
- Title:
- Digital forensics explained. (©2013)
- Main Title:
- Digital forensics explained
- Further Information:
- Note: Greg Gogolin.
- Other Names:
- Gogolin, Greg
- Contents:
- What Is Digital Forensics and What Should You Know about It?; Introduction; Forensic Science; What Does It Take to Be a Digital Forensic Investigator?; Educational Opportunities What Opportunities Are There for Digital Forensic Investigators? What Are the Trends and Challenges in Digital Forensics? Resources Available to Digital Forensic Investigators; Conclusion; References; ; Digital Forensic Approaches and Best Practices; Introduction; First Response; Responding to a Case; Conclusion; References; Other Useful References; ; Digital Forensics Tool Kit; Introduction; Computer Forensics; Write Blockers; Imaging; Add-Ons and Other Technologies; Tools; Mobile Forensics Tools; Visual Analysis; Secured Storage; Damaged Media; Summary ; ; Internet and E-Mail Examinations; Introduction; E-mail; Chat and Messaging Logs; Peer to Peer; Search Engine Activity; Internet History; Social Networking and Gaming; Malware and Viruses; Summary; ; Mobile Forensics; Introduction; Mobile Phone Technology; How a Call Is Made; Forensic Challenges; Forensic Process; Digital Cell Phone Investigation; Geographic Positioning Systems; Cameras; Summary; Cellular Communications Technology Overview; References; ; Cloud Computing and Digital Forensics, Prof. Gerald Emerick; Introduction; Infrastructure as a Service; Platform as a Service; Software as a Service; Service and Deployment Models; Customer versus Cloud Provider Responsibilities; Other Service Models; Multi-Tenancy; User Access and Provisioning;What Is Digital Forensics and What Should You Know about It?; Introduction; Forensic Science; What Does It Take to Be a Digital Forensic Investigator?; Educational Opportunities What Opportunities Are There for Digital Forensic Investigators? What Are the Trends and Challenges in Digital Forensics? Resources Available to Digital Forensic Investigators; Conclusion; References; ; Digital Forensic Approaches and Best Practices; Introduction; First Response; Responding to a Case; Conclusion; References; Other Useful References; ; Digital Forensics Tool Kit; Introduction; Computer Forensics; Write Blockers; Imaging; Add-Ons and Other Technologies; Tools; Mobile Forensics Tools; Visual Analysis; Secured Storage; Damaged Media; Summary ; ; Internet and E-Mail Examinations; Introduction; E-mail; Chat and Messaging Logs; Peer to Peer; Search Engine Activity; Internet History; Social Networking and Gaming; Malware and Viruses; Summary; ; Mobile Forensics; Introduction; Mobile Phone Technology; How a Call Is Made; Forensic Challenges; Forensic Process; Digital Cell Phone Investigation; Geographic Positioning Systems; Cameras; Summary; Cellular Communications Technology Overview; References; ; Cloud Computing and Digital Forensics, Prof. Gerald Emerick; Introduction; Infrastructure as a Service; Platform as a Service; Software as a Service; Service and Deployment Models; Customer versus Cloud Provider Responsibilities; Other Service Models; Multi-Tenancy; User Access and Provisioning; Data Protection and Breaches; Information Technology and Information Security Governance and Change Control Processes; Service Access Vulnerabilities; Migration Planning; Incident Response; Virtualization; Security Benefits of Cloud; ; Incident Response, Det . Jason Otting; Introduction; Case Summary; The Initiation of an Investigation; Information; Evidence Gathering; Interviews and the Analyzing of Evidence; Analyzing the Electronic Evidence; Prosecution and Testimony; Things to Consider; Conclusion; Report Writing and Presentation; Introduction; Report Content and Considerations; Sample Reports; Presenting and Testifying; Archiving; Summary; ; Social Media Forensics, Dr. Barbara L. Ciaramitaro; Introduction to Social Media Social Networking E-mail Blogs Microblogs Event Coordination Location Identification Multimedia Sharing; Search Wikis Web Conferencing Virtual Worlds; Social Media Forensics Street Gangs Terrorist Activity White Collar Crimes; Summary; References; ; Social Engineering Forensics, Dr. Barbara L. Ciaramitaro; Introduction to Social Engineering; Online Social Engineering Attacks; Telephone Social Engineering Attacks Waste Management Social Engineering Attacks Mobile Device Social Engineering Attacks; Personal Social Engineering Attacks; Reverse Social Engineering Attacks; Social Engineering Forensics Social Engineering Attack Vector Vulnerabilities; Conclusion; References; ; Anti –Forensics, Prof. Velislav Pavlov; Anti-Forensic Definition and Concepts; Anti-Forensic Methods Eliminate Trails Hide Evidence Destroy Evidence; Mobile Anti-Forensics; Conclusion; References; ; Link and Visual Analysis; Introduction; Link and Visual Analysis; Conclusion; ; Psychological, Ethical, and Cultural Implications of Digital Forensics; Introduction; Psychological Implications of Digital Forensics; Ethical Implications of Digital Forensics; Cultural Implications; Conclusion; References; ; Index … (more)
- Publisher Details:
- Boca Raton, FL : CRC Press
- Publication Date:
- 2013
- Copyright Date:
- 2013
- Extent:
- 1 online resource (xxi, 176 pages), illustrations
- Subjects:
- 363.250285
Computer crimes -- Investigation
Computer security
Computer engineering
Computer crimes -- Investigation
Computer engineering
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9781439874967
1439874964 - Notes:
- Note: Includes bibliographical references and index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143357
- Ingest File:
- 01_120.xml