For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation
By applying information systems, computer security, and criminal justice principles and practices to crime investigations
and other legal actions, this text teaches students how to use forensically-sound methodologies and software to
acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and
IM forensics, and PDA and Blackberry forensics.
Table of Contents
Preface
Part One: The Foundations
Chapter 1: Crimes, Evidence, Forensics and Discovery
Chapter 2: Computer Forensics and Electronic Discovery
Chapter 3: Computer Crimes, Criminals, and Investigations
Chapter 4: Computer Crime Laws, Federal Rules, and CyberLaw Challenges
Part Two: Fundamentals of Technology, Intrusion
Chapter 5: Fundamentals of Operating Systems and Data Transfer
Chapter 6: Detecting Intrusions, Attacks, and Cover-ups
Chapter 7: Computer Forensics Procedures and Tools
Part Three: Forensics
Chapter 8: Disk (Data) Forensics
Chapter 9: Network Forensics & Firewall Forensics
Chapter 10: Email and Web Mail Forensics
Chapter 11: Internet Forensics
Part Four: Tracking Down Hackers, Malware, & Fraudsters
Chapter 12: Tracking Down Hackers, Viruses, Worms, and Trojans
Chapter 13: Forensic Accounting and Fraud Detection
Part Five: Legal Topics
Chapter 14: On-Premises and Remote Electronic Discovery
Chapter 15: Ethical and Legal Conduct
Appendix A: Court Case Summaries
Appendix B: Samples Legal Forms, Letters, and Motions
Appendix C: Abbreviations and Acronyms
Glossary
References