Skip to main content

Books in Computer forensics

  • Investigating Windows Systems

    • 1st Edition
    • Harlan Carvey
    • English
    Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.
  • Digital Forensics Trial Graphics

    Teaching the Jury through Effective Use of Visuals
    • 1st Edition
    • John Sammons + 1 more
    • English
    Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technology that help anyone understand the complex concepts behind the science. Users will find invaluable information on theory and best practices along with guidance on how to design and deliver successful explanations.
  • Integrating Python with Leading Computer Forensics Platforms

    • 1st Edition
    • Chet Hosmer
    • English
    Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCase by Guidance Software, MPE+ by AccessData, The Open Source Autopsy/SleuthKit by Brian Carrier and WetStone Technologies, and Live Acquisition and Triage Tool US-LATT. This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime. Additionally, the open source availability of the examples allows for sharing and growth within the industry. This book is the first to provide details on how to directly integrate Python into key forensic platforms.
  • Data Breach Preparation and Response

    Breaches are Certain, Impact is Not
    • 1st Edition
    • Kevvie Fowler
    • English
    Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.
  • Implementing Digital Forensic Readiness

    From Reactive to Proactive Process
    • 1st Edition
    • Jason Sachowski
    • English
    Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.
  • Preserving Electronic Evidence for Trial

    A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
    • 1st Edition
    • Ernesto F. Rojas + 1 more
    • English
    The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic evidence. Corporate management personnel (legal & IT) and outside counsel need reliable processes for the litigation hold – identifying, locating, and preserving electronic evidence. Preserving Electronic Evidence for Trial provides the road map, showing you how to organize the digital evidence team before the crisis, not in the middle of litigation. This practice handbook by an internationally known digital forensics expert and an experienced litigator focuses on what corporate and litigation counsel as well as IT managers and forensic consultants need to know to communicate effectively about electronic evidence. You will find tips on how all your team members can get up to speed on each other’s areas of specialization before a crisis arises. The result is a plan to effectively identify and pre-train the critical electronic-evidence team members. You will be ready to lead the team to success when a triggering event indicates that litigation is likely, by knowing what to ask in coordinating effectively with litigation counsel and forensic consultants throughout the litigation progress. Your team can also be ready for action in various business strategies, such as merger evaluation and non-litigation conflict resolution.
  • Digital Forensics

    Threatscape and Best Practices
    • 1st Edition
    • John Sammons
    • English
    Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.
  • The Basics of Digital Forensics

    The Primer for Getting Started in Digital Forensics
    • 2nd Edition
    • John Sammons
    • English
    The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides the reader with real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.
  • Designing and Building Security Operations Center

    • 1st Edition
    • David Nathans
    • English
    Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.
  • Techno Forensics 2008

    • 1st Edition
    • Syngress
    • English
    * 14 Books Valued at over $800 for less than $300!* Titles you can't get anywhere else!* Search pages on an easy-to-read PDF format!Just released from the Techno Forensics 2008 Show in Maryland, this compilation of books includes some of the hottest titles surrounding the forensics field today. In this easy-to-use CD, you'll be able to search through and use thousands of pages in PDF format. From some of our most recent titles to two first edition titles you can't find anywhere else, this CD has it all! This offer is available for a limited time only, so be sure to order your copy today!Malware Forensics by James Aquilina & Cameron MalinPenetration Tester's Open Source Toolkit, Vol 2 by Aaron BaylesWindows Forensic Analysis DVD Toolkit by Harlan CarveyAlternate Data Storage Forensics by Tyler Cohen & Amber SchroaderGoogle Hacking for Penetration Testers by Johnny Long (only available on this cd)Google Hacking for Penetrations Testers, Vol 2 by Johnny LongNo Tech Hacking by Johnny LongPenetration Tester's Open Source Toolkit, Vol 2 by Chris Hurley Unix and Linux Forensic Analysis DVD Toolkit by Chris PogueCyber Crime Investigations by Anthony ReyesScene of the Cybercrime by Debra Littlejohn Shinder (only available on thiscd)Techno Security's Guide to E-Discovery by Jack WilesTechno Security's Guide to Managing Risks by Jack WilesTechno Security's Guide to Securing SCADA by Jack Wiles