Hacking exposed computer forensics : secrets & solutions / Chris Davis, David Cowen, Aaron Phillip.

Davis, Chris [Browse]
New York : McGraw-Hill/Osborne, c2005.
xxx, 444 p. : ill. ; 24 cm.


Summary note
"Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial procedures to prosecute violators successfully while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It's all here - from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you'll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies."--BOOK JACKET.
Includes index.
Action note
Committed to retain in perpetuity — ReCAP Shared Collection (HUL)
  • Preparing for an Incident
  • Case Study: Lab Preparations
  • Cashing Out
  • Preparing for a Forensics Operation
  • The Forensics Process
  • Types of Investigations
  • The Role of the Investigator
  • Elements of a Good Process
  • Cross-Validation
  • Proper Evidence Handling
  • Completeness of Investigation
  • Management of Archives
  • Technical Competency
  • Explicit Definition and Justification for the Process
  • Legal Compliance
  • Flexibility
  • Defining a Process
  • Assessment
  • Acquisition
  • Authentication
  • Analysis
  • Articulation
  • Archival
  • Computer Fundamentals
  • The Bottom-Up View of a Computer
  • It's All Just 1s and 0s
  • Learning from the Past: Giving Computers Memory
  • Basic Input and Output System (BIOS)
  • The Operating System
  • The Applications
  • Types of Media
  • Magnetic Media
  • Optical Media
  • Memory Technologies
  • Forensic Lab Environment Preparation
  • The Ultimate Computer Forensic Lab
  • What Is a Computer Forensic Laboratory?
  • Forensic Lab Security
  • Protecting the Forensic Lab
  • Forensic Computers
  • Components of a Forensic Host
  • Commercially Available Hardware Systems
  • Do-It-Yourself Hardware Systems
  • Data Storage
  • Forensic Hardware and Software Tools
  • Using Hardware Tools
  • Using Software Tools
  • Case Management
  • The Flyaway Kit
  • Bonus: Linux or Windows?
  • Collecting the Evidence
  • Case Study: The Collections Agency
  • Preparations
  • Revelations
  • Collecting Evidence
  • Forensically Sound Evidence Collection.
Other title(s)
Computer forensics
0072256753 (pbk.)
H - S
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...