Guide to Computer Forensics and Investigations (Record no. 2214)

MARC details
000 -LEADER
fixed length control field 08583nam a22002177a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789353506261
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number NEL/G
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Nelson Bill
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Phillips Amelia
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Steuart Christopher
245 10 - TITLE STATEMENT
Title Guide to Computer Forensics and Investigations
250 ## - EDITION STATEMENT
Edition statement 6th Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Delhi
Name of publisher Cengage Learning
Year of publication 2019
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxx, 738p.
500 ## - GENERAL NOTE
General note "Information security"
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 685-690) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: An Overview of Digital Forensics -- Digital Forensics and Other Related Disciplines -- A Brief History of Digital Forensics -- Understanding Case Law -- Developing Digital Forensics Resources -- Preparing for Digital Investigations -- Understanding Law Enforcement Agency Investigations -- Following Legal Processes -- Understanding Private-Sector Investigations -- Maintaining Professional Conduct -- Preparing a Digital Forensics Investigation -- An Overview of a Computer Crime -- An Overview of a Company Policy Violation -- Taking a Systematic Approach -- Procedures for Private-Sector High-Tech Investigations -- Employee Termination Cases -- Internet Abuse Investigations -- E-mail Abuse Investigations -- Attorney-Client Privilege Investigations -- Industrial Espionage Investigations -- Understanding Data Recovery Workstations and Software -- Setting Up Your Workstation for Digital Forensics -- Conducting an Investigation -- Gathering the Evidence -- Understanding Bit-stream Copies -- Analyzing Your Digital Evidence -- Completing the Case -- Critiquing the Case -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding Forensics Lab Accreditation Requirements -- Identifying Duties of the Lab Manager and Staff -- Lab Budget Planning -- Acquiring Certification and Training -- Determining the Physical Requirements for a Digital Forensics Lab -- Identifying Lab Security Needs -- Conducting High-Risk Investigations -- Using Evidence Containers -- Overseeing Facility Maintenance -- Considering Physical Security Needs -- Auditing a Digital Forensics Lab -- Determining Floor Plans for Digital Forensics Labs -- Selecting a Basic Forensic Workstation -- Selecting Workstations for a Lab -- Selecting Workstations for Private-Sector Labs -- Stocking Hardware Peripherals -- Maintaining Operating Systems and Software Inventories -- Using a Disaster Recovery Plan Planning for Equipment Upgrades -- Building a Business Case for Developing a Forensics Lab -- Preparing a Business Case for a Digital Forensics Lab -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding Storage Formats for Digital Evidence -- Raw Format -- Proprietary Formats -- Advanced Forensic Format -- Determining the Best Acquisition Method -- Contingency Planning for Image Acquisitions -- Using Acquisition Tools -- Mini-WinFE Boot CDs and USB Drives -- Acquiring Data with a Linux Boot CD -- Capturing an Image with AccessData FTK Imager Lite -- Validating Data Acquisitions -- Linux Validation Methods -- Windows Validation Methods -- Performing RAID Data Acquisitions -- Understanding RAID -- Acquiring RAID Disks -- Using Remote Network Acquisition Tools -- Remote Acquisition with ProDiscover -- Remote Acquisition with EnCase Enterprise -- Remote Acquisition with R-Tools R-Studio -- Remote Acquisition with WetStone US-LATT PRO -- Remote Acquisition with F-Response -- Using Other Forensics Acquisition Tools -- PassMark Software ImageUSB -- ASR Data SMART -- Runtime Software -- ILookIX IXImager -- SourceForge -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Identifying Digital Evidence -- Understanding Rules of Evidence -- Collecting Evidence in Private-Sector Incident Scenes -- Processing Law Enforcement Crime Scenes -- Understanding Concepts and Terms Used in Warrants -- Preparing for a Search -- Identifying the Nature of the Case -- Identifying the Type of OS or Digital Device -- Determining Whether You Can Seize Computers and Digital Devices -- Getting a Detailed Description of the Location -- Determining Who Is in Charge -- Using Additional Technical Expertise -- Determining the Tools You Need -- Preparing the Investigation Team -- Securing a Digital Incident or Crime Scene -- Seizing Digital Evidence at the Scene -- Preparing to Acquire Digital Evidence -- Processing Incident or Crime Scenes -- Processing Data Centers with RAID Systems -- Using a Technical Advisor -- Documenting Evidence in the Lab -- Processing and Handling Digital Evidence -- Storing Digital Evidence -- Evidence Retention and Media Storage Needs -- Documenting Evidence -- Obtaining a Digital Hash -- Reviewing a Case -- Sample Civil Investigation -- An Example of a Criminal Investigation -- Reviewing Background Information for a Case -- Planning the Investigation -- Conducting the Investigation: Acquiring Evidence with OSForensics -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding File Systems -- Understanding the Boot Sequence -- Understanding Disk Drives -- Solid-State Storage Devices -- Exploring Microsoft File Structures -- Disk Partitions -- Examining FAT Disks -- Examining NTFS Disks -- NTFS System Files -- MFT and File Attributes -- MFT Structures for File Data -- NTFS Alternate Data Streams -- NTFS Compressed Files -- NTFS Encrypting File System -- EFS Recovery Key Agent -- Deleting NTFS Files -- Resilient File System -- Understanding Whole Disk Encryption -- Examining Microsoft BitLocker -- Examining Third-Party Disk Encryption Tools -- Understanding the Windows Registry -- Exploring the Organization of the Windows Registry -- Examining the Windows Registry -- Understanding Microsoft Startup Tasks -- Startup in Windows 7, Windows 8, and Windows 10 -- Startup in Windows NT and Later -- Understanding Virtual Machines -- Creating a Virtual Machine -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Evaluating Digital Forensics Tool Needs -- Types of Digital Forensics Tools -- Tasks Performed by Digital Forensics Tools -- Tool Comparisons -- Other Considerations for Tools -- Digital Forensics Software Tools -- Command-Line Forensics Tools -- Linux Forensics Tools -- Other GUI Forensics Tools -- Digital Forensics Hardware Tools -- Forensic Workstations -- Using a Write-Blocker -- Recommendations for a Forensic Workstation -- Validating and Testing Forensics Software -- Using National Institute of Standards and Technology Tools -- Using Validation Protocols -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Examining Linux File Structures -- File Structures in Ext4 -- Understanding Macintosh File Structures -- An Overview of Mac File Structures -- Forensics Procedures in Mac -- Using Linux Forensics Tools -- Installing Sleuth Kit and Autopsy -- Examining a Case with Sleuth Kit and Autopsy -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Recognizing a Graphics File -- Understanding Bitmap and Raster Images -- Understanding Vector Graphics -- Understanding Metafile Graphics -- Understanding Graphics File Formats -- Understanding Digital Photograph File Formats -- Understanding Data Compression -- Lossless and Lossy Compression -- Locating and Recovering Graphics Files -- Identifying Graphics File Fragments -- Repairing Damaged Headers -- Searching for and Carving Data from Unallocated Space -- Rebuilding File Headers -- Reconstructing File Fragments -- Identifying Unknown File Formats -- Analyzing Graphics File Headers -- Tools for Viewing Images -- Understanding Steganography in Graphics Files -- Using Steganalysis Tools -- Understanding Copyright Issues with Graphics -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Determining What Data to Collect and Analyze -- Approaching Digital Forensics Cases -- Using Autopsy to Validate Data -- Collecting Hash Values in Autopsy -- Validating Forensic Data -- Validating with Hexadecimal Editors -- Validating with Digital Forensics Tools -- Addressing Data-Hiding Techniques -- Hiding Files by Using the OS -- Hiding Partitions -- Marking Bad Clusters -- Bit-Shifting -- Understanding Steganalysis Methods -- Examining Encrypted Files -- Recovering Passwords -- Chapter Summary -- Key Terms
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer crimes
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Accession Number Price effective from Koha item type Copy number
      Not For Loan IIIT Kottayam Central Library IIIT Kottayam Central Library Reference 24/01/2024 TV enterprises, Inv No:625/23-24, dtd 05/01/2024 799.00 005.8 NEL/G 2164 24/01/2024 Reference  
        IIIT Kottayam Central Library IIIT Kottayam Central Library General Stacks 24/01/2024 TV enterprises, Inv No:625/23-24, dtd 05/01/2024 799.00 005.8 NEL/G 2165 24/01/2024 Books 1
        IIIT Kottayam Central Library IIIT Kottayam Central Library General Stacks 24/01/2024 TV enterprises, Inv No:625/23-24, dtd 05/01/2024 799.00 005.8 NEL/G 2166 24/01/2024 Books 2
        IIIT Kottayam Central Library IIIT Kottayam Central Library General Stacks 24/01/2024 TV enterprises, Inv No:625/23-24, dtd 05/01/2024 799.00 005.8 NEL/G 2167 24/01/2024 Books 3
        IIIT Kottayam Central Library IIIT Kottayam Central Library General Stacks 24/01/2024 TV enterprises, Inv No:625/23-24, dtd 05/01/2024 799.00 005.8 NEL/G 2168 24/01/2024 Books 4
IIIT Kottayam Logo       © IIIT Kottayam 2023. All rights reserved.