Cover image for Computer Forensics For Dummies.
Computer Forensics For Dummies.
Title:
Computer Forensics For Dummies.
Author:
Volonino, Linda.
ISBN:
9780470434956
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (387 pages)
Series:
For dummies
Contents:
Computer Forensics For Dummies -- About the Authors -- Dedication -- Authors' Acknowledgments -- Contents at a Glance -- Table of Contents -- Introduction -- Who Should Read This Book? -- About This Book -- How to Use This Book -- What You Don't Need to Read -- Foolish Assumptions -- How This Book Is Organized -- About the Web Site and Blog -- Icons Used in This Book -- Where to Go from Here -- Part I: Digging Out and Documenting Electronic Evidence -- Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away - Until Revelation Day -- Living and Working in a Recorded World -- Giving the Third Degree to Computers, Electronics, and the Internet -- Answering the Big Questions -- Examining Investigative Methods -- Revealing Investigation Results -- Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation -- Deciphering the Legal Codes -- Managing E-Discovery -- Conducting the Investigation in Good Faith -- Deciding Who's Paying the Bill -- Chapter 3: Getting Authorized to Search and Seize -- Getting Authority: Never Start Without It -- Criminal Cases: Papering Your Behind (CYA) -- Civil Cases: Verifying Company Policy -- Chapter 4: Documenting and Managing the Crime Scene -- Obsessing over Documentation -- Directing the Scene -- Managing Evidence Behind the Yellow Tape -- Stepping Through the Scene -- Part II: Preparing to Crack the Case -- Chapter 5: Minding and Finding the Loopholes -- Deciding to Take On a Client -- Determining Whether You Can Help the Case -- Passing the Court's Standard As a Reliable Witness -- Going Forward with the Case -- Keeping a Tight Forensic Defense -- Chapter 6: Acquiring and Authenticating E-Evidence -- Acquiring E-Evidence Properly -- Step 1: Determine the Type of Media You're Working With -- Step 2: Find the Right Tool -- Step 3: Transfer Data -- Step 4: Authenticate the Preserved Data.

Step 5: Make a Duplicate of the Duplicate -- Chapter 7: Examining E-Evidence -- The Art of Scientific Inquiry -- Gearing Up for Challenges -- Getting a Handle on Search Terms -- Challenging Your Results: Plants and Frames and Being in the Wrong Place -- Finding No Evidence -- Reporting Your Analysis -- Chapter 8: Extracting Hidden Data -- Recognizing Attempts to Blind the Investigator -- Defeating Algorithms, Hashes, and Keys -- Finding Out-of-Sight Bytes -- Cracking Passwords -- Decrypting the Encrypted -- Part III: Doing Computer Forensics Investigations -- Chapter 9: E-Mail and Web Forensics -- Opening Pandora's Box of E-Mail -- Scoping Out E-Mail Architecture -- Seeing the E-Mail Forensics Perspective -- Examining Client-Based E-Mail -- Investigating Web-Based Mail -- Searching Browser Files -- Looking through Instant Messages -- Chapter 10: Data Forensics -- Delving into Data Storage -- Finding Digital Cavities Where Data Hides -- Extracting Data -- Rebuilding Extracted Data -- Chapter 11: Document Forensics -- Finding Evidential Material in Documents: Metadata -- Honing In on CAM (Create, Access, Modify) Facts -- Discovering Documents -- Chapter 12: Mobile Forensics -- Keeping Up with Data on the Move -- Making a Device Seizure -- Cutting-Edge Cellular Extractions -- Chapter 13: Network Forensics -- Mobilizing Network Forensic Power -- Identifying Network Components -- Saving Network Data -- Re-Creating an Event from Traffic -- Looking at Network Forensic Tools -- Discovering Network Forensic Vendors -- Chapter 14: Investigating X-Files: eXotic Forensics -- Taking a Closer Look at Answering Machines -- Examining Video Surveillance Systems -- Cracking Home Security Systems -- Tracking Automobiles -- Extracting Information from Radio Frequency Identification (RFID) -- Examining Copiers -- Taking a Look On the Horizon.

Part IV: Succeeding in Court -- Chapter 15: Holding Up Your End at Pretrial -- Pretrial Motions -- Handling Pretrial Hearings -- Giving a Deposition -- Chapter 16: Winning a Case Before You Go to Court -- Working Around Wrong Moves -- Responding to Opposing Experts -- Chapter 17: Standing Your Ground in Court -- Making Good on Deliverables -- Understanding Barroom Brawls in the Courtroom -- Presenting E-Evidence to Persuade -- Communicating to the Court -- Part V: The Part of Tens -- Chapter 18: Ten Ways to Get Qualified and Prepped for Success -- The Front Ten: Certifications -- The Back Ten: Journals and Education -- Chapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness -- Stick to Finding and Telling the Truth -- Don't Fall for Counsel's Tricks in Court -- Be Irrefutable -- Submit a Descriptive, Complete Bill -- Prepare a Clear, Complete Report -- Understand Nonverbal Cues -- Look 'Em Straight in the Eye -- Dress for Your Role As a Professional -- Stay Certified and Up-to-Date -- Know When to Say No -- Chapter 20: Ten Cool Tools for Computer Forensics -- Computer Forensic Software Tools -- Computer Forensic Hardware -- Computer Forensic Laboratories -- Glossary -- Index.
Abstract:
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You'll discover how to use the latest forensic software, tools, and equipment to find the answers that you're looking for in record time. When you understand how data is stored, encrypted, and recovered, you'll be able to protect your personal privacy as well. By the time you finish reading this book, you'll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents' methods Handle passwords and encrypted data Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: