Skip to main content

Books in Computer forensics

    • Investigating Windows Systems

      • 1st Edition
      • August 14, 2018
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 8 1 1 4 1 5 5
      • eBook
        9 7 8 0 1 2 8 1 1 4 1 6 2
      Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.
    • Digital Forensics Trial Graphics

      • 1st Edition
      • March 9, 2017
      • John Sammons + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 4 8 3 5
      • eBook
        9 7 8 0 1 2 8 0 3 4 9 3 4
      Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technology that help anyone understand the complex concepts behind the science. Users will find invaluable information on theory and best practices along with guidance on how to design and deliver successful explanations.
    • Integrating Python with Leading Computer Forensics Platforms

      • 1st Edition
      • September 21, 2016
      • Chet Hosmer
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 9 4 9 0
      • eBook
        9 7 8 0 1 2 8 0 9 9 5 0 6
      Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCase by Guidance Software, MPE+ by AccessData, The Open Source Autopsy/SleuthKit by Brian Carrier and WetStone Technologies, and Live Acquisition and Triage Tool US-LATT. This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime. Additionally, the open source availability of the examples allows for sharing and growth within the industry. This book is the first to provide details on how to directly integrate Python into key forensic platforms.
    • Data Breach Preparation and Response

      • 1st Edition
      • June 8, 2016
      • Kevvie Fowler
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 4 5 1 4
      • eBook
        9 7 8 0 1 2 8 0 3 4 5 0 7
      Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.
    • Hiding Behind the Keyboard

      • 1st Edition
      • March 11, 2016
      • Brett Shavers + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 3 4 0 1
      • eBook
        9 7 8 0 1 2 8 0 3 3 5 2 4
      Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
    • Preserving Electronic Evidence for Trial

      • 1st Edition
      • February 15, 2016
      • Ernesto F. Rojas + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 3 3 5 1
      • eBook
        9 7 8 0 1 2 8 0 9 3 6 6 5
      The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic evidence. Corporate management personnel (legal & IT) and outside counsel need reliable processes for the litigation hold – identifying, locating, and preserving electronic evidence. Preserving Electronic Evidence for Trial provides the road map, showing you how to organize the digital evidence team before the crisis, not in the middle of litigation. This practice handbook by an internationally known digital forensics expert and an experienced litigator focuses on what corporate and litigation counsel as well as IT managers and forensic consultants need to know to communicate effectively about electronic evidence. You will find tips on how all your team members can get up to speed on each other’s areas of specialization before a crisis arises. The result is a plan to effectively identify and pre-train the critical electronic-evidence team members. You will be ready to lead the team to success when a triggering event indicates that litigation is likely, by knowing what to ask in coordinating effectively with litigation counsel and forensic consultants throughout the litigation progress. Your team can also be ready for action in various business strategies, such as merger evaluation and non-litigation conflict resolution.
    • The Basics of Digital Forensics

      • 2nd Edition
      • December 9, 2014
      • John Sammons
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 6 3 5 0
      • eBook
        9 7 8 0 1 2 8 0 1 8 9 2 7
      The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides the reader with real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.
    • Designing and Building Security Operations Center

      • 1st Edition
      • November 6, 2014
      • David Nathans
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 9 9 7
      • eBook
        9 7 8 0 1 2 8 0 1 0 9 6 9
      Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.
    • Malware Forensics Field Guide for Linux Systems

      • 1st Edition
      • December 7, 2013
      • Eoghan Casey + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 4 7 0 0
      • eBook
        9 7 8 1 5 9 7 4 9 4 7 1 7
      Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program. This book will appeal to computer forensic investigators, analysts, and specialists.
    • Cloud Storage Forensics

      • 1st Edition
      • November 16, 2013
      • Darren Quick + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 7 0 5
      • eBook
        9 7 8 0 1 2 4 1 9 9 9 1 0
      To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.