Book description
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to inve
Table of contents
- Front cover
- Dedication
- Contents
- About the Author
- Preface
- Chapter 1. The Initial Contact
- Chapter 2. Client Site Arrival
- Chapter 3. Evidence Collection Procedures (1/2)
- Chapter 3. Evidence Collection Procedures (2/2)
- Chapter 4. Evidence Collection and Analysis Tools (1/9)
- Chapter 4. Evidence Collection and Analysis Tools (2/9)
- Chapter 4. Evidence Collection and Analysis Tools (3/9)
- Chapter 4. Evidence Collection and Analysis Tools (4/9)
- Chapter 4. Evidence Collection and Analysis Tools (5/9)
- Chapter 4. Evidence Collection and Analysis Tools (6/9)
- Chapter 4. Evidence Collection and Analysis Tools (7/9)
- Chapter 4. Evidence Collection and Analysis Tools (8/9)
- Chapter 4. Evidence Collection and Analysis Tools (9/9)
- Chapter 5. AccessData's Forensic Tool Kit (1/4)
- Chapter 5. AccessData's Forensic Tool Kit (2/4)
- Chapter 5. AccessData's Forensic Tool Kit (3/4)
- Chapter 5. AccessData's Forensic Tool Kit (4/4)
- Chapter 6. Guidance Software's EnCase (1/8)
- Chapter 6. Guidance Software's EnCase (2/8)
- Chapter 6. Guidance Software's EnCase (3/8)
- Chapter 6. Guidance Software's EnCase (4/8)
- Chapter 6. Guidance Software's EnCase (5/8)
- Chapter 6. Guidance Software's EnCase (6/8)
- Chapter 6. Guidance Software's EnCase (7/8)
- Chapter 6. Guidance Software's EnCase (8/8)
- Chapter 7. ILook Investigator (1/4)
- Chapter 7. ILook Investigator (2/4)
- Chapter 7. ILook Investigator (3/4)
- Chapter 7. ILook Investigator (4/4)
- Chapter 8. Password Recovery
- Chapter 9. Questions and Answers by Subject Area (1/4)
- Chapter 9. Questions and Answers by Subject Area (2/4)
- Chapter 9. Questions and Answers by Subject Area (3/4)
- Chapter 9. Questions and Answers by Subject Area (4/4)
- Chapter 10. Recommended Reference Materials (1/2)
- Chapter 10. Recommended Reference Materials (2/2)
- Chapter 11. Case Study (1/7)
- Chapter 11. Case Study (2/7)
- Chapter 11. Case Study (3/7)
- Chapter 11. Case Study (4/7)
- Chapter 11. Case Study (5/7)
- Chapter 11. Case Study (6/7)
- Chapter 11. Case Study (7/7)
- Appendix A: Glossary (1/2)
- Appendix A: Glossary (2/2)
- Appendix B: Port Numbers Used By Malicious Trojan Horse Programs
- Appendix C: Attack Signatures
- Appendix D: UNIX/Linux Commands (1/4)
- Appendix D: UNIX/Linux Commands (2/4)
- Appendix D: UNIX/Linux Commands (3/4)
- Appendix D: UNIX/Linux Commands (4/4)
- Appendix E: Cisco PIX Firewall Commands (1/2)
- Appendix E: Cisco PIX Firewall Commands (2/2)
- Appendix F: Discovering Unauthorized Access to Your Computer (1/2)
- Appendix F: Discovering Unauthorized Access to Your Computer (2/2)
- Appendix G: Electromagnetic Field Analyis (EFA) "Tickler"
- Appendix H: The Intelligence Community Since 9/11 (1/2)
- Appendix H: The Intelligence Community Since 9/11 (2/2)
- Appendix I: Answers to Chapter Questions (1/2)
- Appendix I: Answers to Chapter Questions (2/2)
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Cyber Crime Investigator's Field Guide, 2nd Edition
- Author(s):
- Release date: January 2005
- Publisher(s): Auerbach Publications
- ISBN: 9781420031324
You might also like
book
Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s …
book
Cyber Crime Investigations
Written by a former NYPD cyber cop, this is the only book available that discusses the …
book
Cybersecurity Law, 2nd Edition
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments …
book
A Practical Guide to Digital Forensics Investigations, 2nd Edition
THE DEFINITIVE GUIDE TO DIGITAL FORENSICSNOW THOROUGHLY UPDATED WITH NEW TECHNIQUES, TOOLS, AND SOLUTIONS Complete, practical …