CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
Forensic course development: one year later
CITC5 '04 Proceedings of the 5th conference on Information technology education
Criminal computer forensics management
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Expert system using fuzzy petri nets in computer forensics
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Self-reported computer criminal behavior: A psychological analysis
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Analysis of firewall log-based detection scenarios for evidence in digital forensics
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities and how cyber forensics can uncover them. Extensive appendices include websites, organizations, pertinent legislation, best practice, hardware and software, and a recap of the federal rules of civil procedure.