Uncover a digital trail of e-evidence by using the helpful,
easy-to-understand information in Computer Forensics For
Dummies! Professional and armchair investigators alike can
learn the basics of computer forensics, from digging out electronic
evidence to solving the case. You won’t need a computer
science degree to master e-discovery. Find and filter data in
mobile devices, e-mail, and other Web-based technologies.
You’ll learn all about e-mail and Web-based forensics,
mobile forensics, passwords and encryption, and other e-evidence
found through Vo IP, voicemail, legacy mainframes, and databases.
You’ll discover how to use the latest forensic software,
tools, and equipment to find the answers that you’re looking
for in record time. When you understand how data is stored,
encrypted, and recovered, you’ll be able to protect your
personal privacy as well. By the time you finish reading this book,
you’ll know how to:
* Prepare for and conduct computer forensics investigations
* Find and filter data
* Protect personal privacy
* Transfer evidence without contaminating it
* Anticipate legal loopholes and opponents’ methods
* Handle passwords and encrypted data
* Work with the courts and win the case
Plus, Computer Forensics for Dummies includes lists of
things that everyone interested in computer forensics should know,
do, and build. Discover how to get qualified for a career in
computer forensics, what to do to be a great investigator and
expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are
not included as part of e Book file.
विषयसूची
Introduction.
Part I: Digging Out and Documenting Electronic
Evidence.
Chapter 1: Knowing What Your Digital Devices Create, Capture,
and Pack Away — Until Revelation Day.
Chapter 2: Suiting Up for a Lawsuit or Criminal
Investigation.
Chapter 3: Getting Authorized to Search and Seize.
Chapter 4: Documenting and Managing the Crime Scene.
Part II: Preparing to Crack the Case.
Chapter 5: Minding and Finding the Loopholes.
Chapter 6: Acquiring and Authenticating E-Evidence.
Chapter 7: Examining E-Evidence.
Chapter 8: Extracting Hidden Data.
Part III: Doing Computer Forensic Investigations.
Chapter 9: E-Mail and Web Forensics.
Chapter 10: Data Forensics.
Chapter 11: Document Forensics.
Chapter 12: Mobile Forensics.
Chapter 13: Network Forensics.
Chapter 14: Investigating X-Files: e Xotic Forensics.
Part IV: Succeeding in Court.
Chapter 15: Holding Up Your End at Pretrial.
Chapter 16: Winning a Case Before You Go to Court.
Chapter 17: Standing Your Ground in Court.
Part V: The Part of Tens.
Chapter 18: Ten Ways to Get Qualifi ed and Prepped for
Success.
Chapter 19: Ten Tactics of an Excellent Investigator and a
Dangerous Expert Witness.
Chapter 20: Ten Cool Tools for Computer Forensics.
Glossary.
Index.
लेखक के बारे में
Linda Volonino (Ph D, MBA, CISSP, ACFE) is a computer forensic investigator and expert witness with Robson Forensic, Inc. and a member of Infra Gard. Reynaldo Anzaldua (MBA, CISSP, En CE, CHFI, IBM I-Series) teaches computer forensics and information security at South Texas College and works with private organizations and government agencies.