Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Forensic Analysis


1. 

Windows Forensic Analysis Toolkit, 4th Edition

Windows Forensic Analysis Toolkit, 4th Edition

By: Harlan Carvey

Publisher: Syngress

Publication Date: 11-MAR-2014

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Harlan Carvey has updated Windows Forensic Analysis Toolkit , now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free...

2. 

Investigating Internet Crimes

Investigating Internet Crimes

By: Todd G. Shipley; Art Bowker

Publisher: Syngress

Publication Date: 12-NOV-2013

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse...

3. 

Cloud Storage Forensics

Cloud Storage Forensics

By: Darren Quick; Ben Martini; Raymond Choo

Publisher: Syngress

Publication Date: 16-NOV-2013

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you...

4. 

Computer Forensics with FTK

Computer Forensics with FTK

By: Fernando Carbone

Publisher: Packt Publishing

Publication Date: 20-MAR-2014

Insert Date: 22-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios Receive step-by-step guidance on conducting computer investigations Explore the functionality of FTK Imager and learn to use its features effectively Conduct increasingly challenging and more applicable digital investigations for generating effective evidence using the FTK platform In Detail With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry...

5. 

Computer-Forensik, 6th Edition

Computer-Forensik, 6th Edition

By: Alexander Geschonneck

Publisher: dpunkt

Publication Date: 18-MAR-2014

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Dieses Buch zeigt, wie sich Unternehmen auf die Analyse von Computerstraftaten vorbereiten können, welche Maßnahmen »im Fall der Fälle« (und danach) zu ergreifen sind und wie man bei Bedarf Behörden einbezieht. Beschrieben werden u.a. Post-mortem-Analyse, geeignete Toolkits, forensische Analyse unter Unix und Windows sowie bei PDAs und Routern.In der 6. Auflage wurden Statistiken und Toolbeschreibungen aktualisiert sowie neueste rechtliche Entwicklungen aufgenommen. Hinzugekommen sind neue Ansätze der strukturierten Untersuchung von Hauptspeicherinhalten und die Analyse von Malware....

6. 

Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

By: Cameron H. Malin; Eoghan Casey; James M. Aquilina

Publisher: Syngress

Publication Date: 07-DEC-2013

Insert Date: 12-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a...

7. 

X-Ways Forensics Practitioner’s Guide

X-Ways Forensics Practitioner’s Guide

By: Brett Shavers; Eric Zimmerman

Publisher: Syngress

Publication Date: 10-AUG-2013

Insert Date: 03-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. ...

8. 

From the Files of a Security Expert Witness

From the Files of a Security Expert Witness

By: Charles A. Sennewald

Publisher: Butterworth-Heinemann

Publication Date: 09-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

From the Files of a Security Expert Witness guides the reader through the experience of testifying in court on security issues in civil litigation. Written by one of the security profession's best-known expert witnesses, the book explores 36 cases that reflect the high drama of true crime, including kidnapping, rape, and murder. Many of these cases led to premises liability lawsuits based on claims of negligence, inadequate security, false arrest and imprisonment, excessive use of force, and others. Effective security specialists, whether or not they are considering becoming expert...

9. 

Cybercrime and Cloud Forensics

Cybercrime and Cloud Forensics

By: Keyun Ruan

Publisher: IGI Global

Publication Date: 31-DEC-2012

Insert Date: 24-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

While cloud computing continues to transform developments in information technology services, these advancements have contributed to a rise in cyber attacks; producing an urgent need to extend the applications of investigation processes. Cybercrime and Cloud Forensics: Applications for Investigation Processes presents a collection of research and case studies of applications for investigation processes in cloud computing environments. This reference source brings together the perspectives of cloud customers, security architects, and law enforcement agencies in the developing area of cloud...

10. 

Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security

Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security

By: Chang-Tsun Li

Publisher: IGI Global

Publication Date: 31-MAY-2013

Insert Date: 24-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The revolutionary way in which modern technologies have enabled us to exchange information with ease has created a demand for interdisciplinary research in digital forensics and investigations aiming to combat the abuse of computer technologies. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security presents various digital crime and forensic disciplines that use electronic devices and software for crime prevention and detection. This book provides theoretical and empirical research articles and case studies for a broad range of academic readers as well as...

11. 

Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

By: 

Publisher: John Wiley & Sons

Publication Date: 15-APR-2013

Insert Date: 20-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

"Having worked with Erik on some of the most challenging computer forensic investigations during the early years of this industry's formation as well as having competed with him earnestly in the marketplace...I can truly say that Erik is one of the unique pioneers of computer forensic investigations. He not only can distill complex technical information into easily understandable concepts, but he always retained a long-term global perspective on the relevancy of our work and on the impact of the information revolution on the social and business structures of tomorrow." —From the Foreword...

12. 

Computer Forensics: A Pocket Guide

Computer Forensics: A Pocket Guide

By: Dr. Nathan Clarke

Publisher: IT Governance Ltd

Publication Date: 06-APR-2010

Insert Date: 11-JUN-2013

Slots: 1.0

Table of Contents • Start Reading

How would your organisation cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! The primary purpose of computer forensics is to enable organisations to pinpoint where the malware has infected their computer systems and which files have been infected, so that they can close the vulnerability. More and more organisations have realised that they need to acquire a forensic capability to ensure they are ready to cope with an information security incident. This pocket guide illustrates the technical complexities involved in computer forensics,...

13. 

E-Discovery and the Federal Rules of Civil Procedures

E-Discovery and the Federal Rules of Civil Procedures

By: Bradley Schaufenbuel

Publisher: IT Governance Ltd

Publication Date: 01-JUL-2007

Insert Date: 11-JUN-2013

Slots: 1.0

Table of Contents • Start Reading

" The Federal Rules of Civil Procedure (FRCP) govern the activities of all US federal civil courts. They contain discovery requirements that any company must satisfy when it is the subject of a civil action, such as an employment discrimination lawsuit or an intellectual property dispute. FRCP Updated The FRCP have been amended and updated to take account of electronic information. Attorneys can no longer just throw individual E-Discovery requests 'over the wall' to the IT department. Indeed, the pitfalls associated with E-Discovery represent one of the greatest risks that...

14. 

Digital Archaeology: The Art and Science of Digital Forensics

Digital Archaeology: The Art and Science of Digital Forensics

By: Michael W. Graves

Publisher: Addison-Wesley Professional

Publication Date: 27-AUG-2013

Insert Date: 26-MAY-2013

Slots: 1.0

Table of Contents • Start Reading

The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has written the most thorough, realistic, and up-to-date guide to the principles and techniques of modern digital forensics. Graves begins by providing a solid understanding of the legal underpinnings of and critical laws affecting computer forensics, including key principles of evidence and case law. Next, he explains how to...

15. 

An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or...

16. 

Computer Forensics InfoSec Pro Guide

Computer Forensics InfoSec Pro Guide

By: David Cowen

Publisher: McGraw-Hill

Publication Date: 19-MAR-2013

Insert Date: 04-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional,Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. ...

17. 

Cybercrime and Espionage

Cybercrime and Espionage

By: Will Gragido; John Pirc

Publisher: Syngress

Publication Date: 07-JAN-2011

Insert Date: 29-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed “Subversive Multi-Vector Threats” or ‘SMT’s. Whether the goal is to acquire and subsequently sell intellectual property from...

18. 

Placing the Suspect Behind the Keyboard

Placing the Suspect Behind the Keyboard

By: Brett Shavers

Publisher: Syngress

Publication Date: 01-FEB-2013

Insert Date: 06-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining...

19. 

Cybercrime Investigative Case Management

Cybercrime Investigative Case Management

By: Brett Shavers

Publisher: Syngress

Publication Date: 15-JAN-2013

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate suspects...

20. 

Cybercrime Investigation Case Studies

Cybercrime Investigation Case Studies

By: Brett Shavers

Publisher: Syngress

Publication Date: 17-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use...