Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Computer Forensics: Computer Crime Scene Investigation (repost)

    Posted By: MoneyRich
    Computer Forensics: Computer Crime Scene Investigation (repost)

    John R. Vacca, "Computer Forensics: Computer Crime Scene Investigation"
    Charles River Media | May 27, 2005 | ISBN: 1584503890 | 865 pages | PDF | 3 MB

    This completely updated book provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals.
    Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.
    KEY FEATURES
    • Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks
    • Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter

    Selected topics include:
    Computer Forensics Fundamentals;
    Data Recovery;
    Evidence Collection and Data Seizure;
    Computer Image Verifi cation;
    Duplication and Preservation of Digital Evidence;
    Electronic Evidence Reconstructing Past Events;
    Deterrence through Attacker ID;
    Destruction of e-mail;
    Networks;
    Protection against Random Terrorist Information Warfare Tactics;
    The Cyber Foot Print and Criminal Tracking;
    The Individual Exposed;
    Advanced Encryption & Hacking;
    Case Studies and Vignettes;
    Evidence Checklists and Forms

    Contents
    Acknowledgments
    Foreword
    Introduction
    Part I: Overview of Computer Forensics Technology
    1 Computer Forensics Fundamentals
    2 Types of Computer Forensics Technology
    3 Types of Computer Forensics Systems
    4 Vendor and Computer Forensics Sen/ices
    Part II: Computer Forensics Evidence and Capture
    5 Data Recovery
    6 Evidence Collection and Data Seizure
    7 Duplication and Preservation of Digital Evidence
    8 Computer Image Verification and Authentication
    Part III: Computer Forensics Analysis
    9 Discovery of Electronic Evidence
    10 Identification of Data
    11 Reconstructing Past Events
    12 Networks
    Part IV: Countermeasures: Information Warfare
    13 Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
    14 The Information Warfare Arsenal and Tactics of the Military
    15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues
    16 The Information Warfare Arsenal and Tactics of Private Companies
    17 The Information Warfare Arsenal of the Future
    18 Surveillance Tools for Information Warfare of the Future
    19 Civilian Casualties: The Victims and Refugees of Information Warfare
    Part V: Advanced Computer Forensics Systems and Future Directions
    20 Advanced Computer Forensics
    21 Summary, Conclusions, and Recommendations
    Appendix A: Frequently Asked Questions
    Appendix B: Computer Forensics Resources
    Appendix C: Links to Computer Forensics and Related Law Enforcement Web Pages
    Appendix D: More Computer Forensics Cases
    Appendix E: Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter
    Appendix F: Checklists by Chapter
    Appendix G: About the CD-ROM
    Appendix H: Glossary of Terms and Acronyms