000 | 09788cam a2200541Ii 4500 | ||
---|---|---|---|
001 | u158051 | ||
003 | SIRSI | ||
005 | 20240916205721.0 | ||
008 | 150114s2015 inuac b 001 0 eng | ||
010 | _a 2014955541 | ||
015 |
_aGBB507652 _2bnb |
||
020 |
_a9780789741158 _q(paperback) |
||
020 |
_a0789741156 _q(paperback) |
||
035 |
_a(OCoLC)903203003 _z(OCoLC)754745043 _z(OCoLC)898907835 |
||
050 | 4 |
_aHV8079.C65 _bH39 2015 |
|
082 | 0 | 4 |
_a364.168 _223 |
092 |
_a364.168 _bH417p |
||
100 | 1 |
_aHayes, Darren Richard, _eauthor. |
|
245 | 1 | 2 |
_aA practical guide to computer forensics investigations / _cDarren R. Hayes. |
246 | 3 | 0 | _aComputer forensics |
264 | 1 |
_aIndianapolis, Indiana, USA : _bPearson, _c[2015] |
|
264 | 4 | _c | |
300 |
_axxi, 502 pages : _billustrations, portraits ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
490 | 1 | _aAlways learning | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aMachine generated contents note: Introduction -- Popular Myths about Computer Forensics -- Types of Computer Forensics Evidence Recovered -- Electronic Mail (Email) -- Images -- Video -- Websites Visited and Internet Searches -- Cellphone Forensics -- What Skills Must a Computer Forensics Investigator Possess? -- Computer Science Knowledge -- Legal Expertise -- Communication Skills -- Linguistic Abilities -- Continuous Learning -- An Appreciation for Confidentiality -- The Importance of Computer Forensics -- Job Opportunities -- A History of Computer Forensics -- 1980's: The Advent of the Personal Computer -- 1990's: The Impact of the Internet -- Training and Education -- Law Enforcement Training -- Summary -- Introduction -- Physical and Logical Storage -- File Storage -- File Conversion and Numbering Formats -- Conversion of Binary to Decimal -- Hexadecimal Numbering -- Conversion of Hexadecimal to Decimal. | |
505 | 0 | _aContents note continued: Conversion of Hexadecimal to ASCII (American Standard Code for Information Interchange) -- Unicode -- Operating Systems -- The Boot Process -- Windows File Systems -- Windows Registry -- Registry Data Types -- FTK Registry Viewer -- Microsoft Windows Features -- Windows Vista -- Windows 7 -- Windows 8.1 -- Summary -- Introduction -- Hard Disk Drives -- Small Computer System Interface (SCSI) -- Integrated Drive Electronics (IDE) -- Serial ATA (SATA) -- Cloning a PATA or SATA Hard Disk -- Cloning Devices -- Removable Memory -- FireWire -- USB Flash Drives -- External Hard Drives -- MultiMedia Cards (MMCs) -- Summary -- References -- Introduction -- Lab Requirements -- American Society of Crime Laboratory Directors -- American Society of Crime Laboratory Directors/Lab Accreditation Board (ASCLD/LAB) -- ASCLD/LAB Guidelines for Forensic Laboratory Management Practices -- Scientific Working Group on Digital Evidence (SWGDE). | |
505 | 0 | _aContents note continued: Private Sector Computer Forensics Laboratories -- Evidence Acquisition Laboratory -- Email Preparation Laboratory -- Inventory Control -- Web Hosting -- Computer Forensics Laboratory Requirements -- Laboratory Layout -- Laboratory Management -- Laboratory Access -- Extracting Evidence from a Device -- Using the dd Utility -- Using Global Regular Expressions Print (GREP) -- Skimmers -- Summary -- Introduction -- Working Undercover -- Generate an Identity -- Generate an Email Account -- Mask Your Identity -- Website Evidence -- Website Archives -- Website Statistics -- Background Searches on a Suspect -- Personal Information: Mailing Address, Email Address, Telephone Number, and Assets -- Personal Interests and Membership of User Groups -- Searching for Stolen Property -- Online Crime -- Identity Theft -- Credit Cards for Sale -- Electronic Medical Records -- Cyberbullying -- Social Networking -- Capturing Online Communications -- Using Screen Captures. | |
505 | 0 | _aContents note continued: Using Video -- Viewing Cookies -- Using Windows Registry -- Summary -- Introduction -- Obtaining Evidence from a Service Provider -- Documenting a Crime Scene -- Seizing Evidence -- Crime Scene Examinations -- Documenting the Evidence -- Completing a Chain of Custody Form -- Completing a Computer Worksheet -- Completing a Hard Disk Drive Worksheet -- Completing a Server Worksheet -- Using Tools to Document an Investigation -- CaseNotes -- FragView -- Helpful Mobile Applications (Apps) -- Network Analyzer -- System Status -- The Cop App -- Lock and Code -- Digital Forensics Reference -- Federal Rules of Civil Procedure (FRCP) -- Federal Rules of Evidence (FREvidence) -- Writing Reports -- Time Zones and Daylight Saving Time (DST) -- Creating a Comprehensive Report -- Using Expert Witnesses at Trial -- The Expert Witness -- The Goals of the Expert Witness -- Preparing an Expert Witness for Trial -- Summary -- Introduction. | |
505 | 0 | _aContents note continued: History and Structure of the United States Legal System -- Origins of the U.S. Legal System -- Overview of the U.S. Court System -- In the Courtroom -- Evidence Admissibility -- Constitutional Law -- First Amendment -- First Amendment and the Internet -- Fourth Amendment -- Fifth Amendment -- Sixth Amendment -- Congressional Legislation -- Rules for Evidence Admissibility -- Criminal Defense -- When Computer Forensics Goes Wrong -- Pornography in the Classroom -- Structure of the Legal System in the European Union (E.U.) -- Origins of European Law -- Structure of European Union Law -- Structure of the Legal System in Asia -- China -- India -- Summary -- Introduction -- The Tools of the Trade -- Networking Devices -- Proxy Servers -- Web Servers -- DHCP Servers -- SMTP Servers -- DNS Servers -- Routers -- IDS -- Firewalls -- Ports -- Understanding the OSI Model -- The Physical Layer -- The Data Link Layer -- The Network Layer -- The Transport Layer. | |
505 | 0 | _aContents note continued: The Session Layer -- The Presentation Layer -- The Application Layer -- Advanced Persistent Threats -- Cyber Kill Chain -- Indicators of Compromise (IOC) -- Investigating a Network Attack -- Summary -- Introduction -- The Cellular Network -- Base Transceiver Station -- Mobile Station -- Cellular Network Types -- SIM Card Forensics -- Types of Evidence -- Handset Specifications -- Memory and Processing -- Battery -- Other Hardware -- Mobile Operating Systems -- Android OS -- Windows Phone -- Standard Operating Procedures for Handling Handset Evidence -- National Institute of Standards and Technology -- Preparation and Containment -- Wireless Capabilities -- Documenting the Investigation -- Handset Forensics -- Cellphone Forensic Software -- Cellphone Forensics Hardware -- Logical versus Physical Examination -- Manual Cellphone Examinations -- Flasher Box -- Global Satellite Service Providers -- Satellite Communication Services -- Legal Considerations. | |
505 | 0 | _aContents note continued: Carrier Records -- Other Mobile Devices -- Tablets -- GPS Devices -- Summary -- Introduction -- Understanding Digital Photography -- File Systems -- Digital Photography Applications and Services -- Examining Picture Files -- Exchangeable Image File Format (EXIF) -- Evidence Admissibility -- Federal Rules of Evidence (FRE) -- Analog vs. Digital Photographs -- Case Studies -- Worldwide Manhunt -- NYPD Facial Recognition Unit -- Summary -- Introduction -- A Brief History -- Macintosh -- Mac Mini with OS X Server -- iPod -- iPhone -- iPad -- Apple Wi-Fi Devices -- Macintosh File Systems -- Forensic Examinations of a Mac -- 10Reg Info -- PMAP Info -- Epoch Time -- Recovering Deleted Files -- Journaling -- DMG File System -- PList Files -- SQLite Databases -- Macintosh Operating Systems -- Mac OS X -- Target Disk Mode -- Apple Mobile Devices -- iOS -- iOS 7 -- iOS 8 -- Security and Encryption -- iPod -- iPhone. | |
505 | 0 | _aContents note continued: Enterprise Deployment of iPhone and iOS Devices -- Case Studies -- Find My iPhone -- Wanted Hactevist -- Michael Jackson -- Stolen iPhone -- Drug Bust -- Summary -- Introduction -- Zacharias Moussaoui -- Background -- Digital Evidence -- Standby Counsel Objections -- Prosecution Affidavit -- Exhibits -- Email Evidence -- BTK (Bind Torture Kill) Killer -- Profile of a Killer -- Evidence -- Cyberbullying -- Federal Anti-harassment Legislation -- State Anti-harassment Legislation -- Warning Signs of Cyberbullying -- What Is Cyberbullying? -- Phoebe Prince -- Ryan Halligan -- Megan Meier -- Tyler Clementi -- Sports -- Summary. | |
520 | _aA Practical Guide to Computer Forensics Investigations introduces the newest technologies along with detailed information on how the evidence contained on these devices should be analyzed. Packed with practical, hands-on activities, students will learn unique subjects from chapters including Mac Forensics, Mobile Forensics, Cyberbullying, and Child Endangerment. This well-developed book will prepare students for the rapidly-growing field of computer forensics for a career with law enforcement, accounting firms, banks and credit card companies, private investigation companies, or government agencies. | ||
650 | 0 |
_aComputer crimes _xInvestigation. |
|
650 | 0 | _aComputer security. | |
650 | 0 | _aEvidence, Criminal. | |
650 | 0 | _aForensic sciences. | |
650 | 7 |
_aComputer crimes _xInvestigation. _2fast _0(OCoLC)fst00872065 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aEvidence, Criminal. _2fast _0(OCoLC)fst00917210 |
|
650 | 7 |
_aForensic sciences. _2fast _0(OCoLC)fst00932011 |
|
830 | 0 | _aAlways learning. | |
949 |
_cc.1 _lON-ORDER _tBOOK _xPRINT _p |
||
999 |
_a364.168 H417P _wDEWEY _c4901 _i51994001709478 _d4901 _e1/2/2020 _f6/29/2023 _g2 _lCIRCSTACKS _mLRC _n1 _p$65.00 _rY _sY _tBOOK _u7/26/2018 _xPRINT |