|
![]() |
|||
|
||||
OverviewNo matter how secure computer users think their information is, chances are there are hackers who can access it. This comprehensive reference provides readers with all the information and software they need to track down these computer criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. The book contains a thorough overview of the subject from basic definitions to data recovery techniques to auditing methods to terrorist cyber-attacks. Numerous exercises, case studies, and vignettes of actual criminal methods enhance the topics under discussion, providing the reader with solutions to computer crime in the real world. Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Case Studies and Vignettes. Full Product DetailsAuthor: John R. VaccaPublisher: Cengage Learning, Inc Imprint: Charles River Media Edition: 2nd Revised edition Dimensions: Width: 18.50cm , Height: 5.10cm , Length: 22.90cm Weight: 1.456kg ISBN: 9781584503897ISBN 10: 1584503890 Pages: 750 Publication Date: 02 January 2005 Audience: General/trade , College/higher education , Professional and scholarly , General , Tertiary & Higher Education Format: Mixed media product Publisher's Status: Out of Print Availability: Out of stock ![]() Table of ContentsIntroduction PART I OVERVIEW OF COMPUTER FORENSICS TECHNOLOGY Chapter 1 Computer Forensics Fundamentals Chapter 2 Types of Computer Forensics Technology Chapter 3 Types of Computer Forensics Systems Chapter 4 Vendor and Computer Forensics Services PART II COMPUTER FORENSICS EVIDENCE AND CAPTURE Chapter 5 Data Recovery Chapter 6 Evidence Collection and Data Seizure Chapter 7 Duplication and Preservation of Digital Evidence Chapter 8 Computer Image Verification and Authentication PART III COMPUTER FORENSICS ANALYSIS Chapter 9 Discovery of Electronic Evidence Chapter 10 Identification of Data Chapter 11 Reconstructing Past Events Chapter 12 Networks PART IV COUNTERMEASURES: INFORMATION WARFARE Chapter 13 Fighting Against Macro Threats: Defensive Strategies Chapter 14 The Information Warfare Arsenal and Tactics of the Military Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies Chapter 17 The Information Warfare Arsenal of the Future Chapter 18 Surveillance Tools for Information Warfare of the Future Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare PART V ADVANCED COMPUTER FORENSICS SYSTEMS AND FUTURE DIRECTIONS Chapter 20 Advanced Computer Forensics Chapter 21 Summary, Conclusions, and Recommendations Appendix A Frequently Asked Questions Appendix B Computer Forensics Resources Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages Appendix D More Computer Forensics Cases Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter Appendix F Checklists by Chapter Appendix G About the CD-ROM Appendix H Glossary of Terms and Acronyms IndexReviewsAuthor InformationJohn Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computerrelated topics, including Electronic Commerce 4/E. Tab Content 6Author Website:Countries AvailableAll regions |