Digital Evidence and Computer Crime

Forensic Science, Computers, and the Internet

Nonfiction, Computers, Advanced Computing, Information Technology, Networking & Communications, General Computing
Cover of the book Digital Evidence and Computer Crime by Eoghan Casey, BS, MA, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Eoghan Casey, BS, MA ISBN: 9780080921488
Publisher: Elsevier Science Publication: April 12, 2011
Imprint: Academic Press Language: English
Author: Eoghan Casey, BS, MA
ISBN: 9780080921488
Publisher: Elsevier Science
Publication: April 12, 2011
Imprint: Academic Press
Language: English

Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation.

It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.

This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.

New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.

This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).

  • Named The 2011 Best Digital Forensics Book by InfoSec Reviews
  • Provides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence
  • Features coverage of the abuse of computer networks and privacy and security issues on computer networks
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation.

It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.

This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.

New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.

This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).

More books from Elsevier Science

Cover of the book Handbook of Aging and the Social Sciences by Eoghan Casey, BS, MA
Cover of the book Emerging Trends in Image Processing, Computer Vision and Pattern Recognition by Eoghan Casey, BS, MA
Cover of the book Technology and Applications of Polymers Derived from Biomass by Eoghan Casey, BS, MA
Cover of the book The Science and Technology of Counterterrorism by Eoghan Casey, BS, MA
Cover of the book Kinetics of Aggregation and Gelation by Eoghan Casey, BS, MA
Cover of the book Laboratory Methods in Microbiology by Eoghan Casey, BS, MA
Cover of the book Introduction to Volcanic Seismology by Eoghan Casey, BS, MA
Cover of the book Structures of Large RNA Molecules and Their Complexes by Eoghan Casey, BS, MA
Cover of the book Aggression by Eoghan Casey, BS, MA
Cover of the book Advances in Biomembranes and Lipid Self-Assembly by Eoghan Casey, BS, MA
Cover of the book Pulp and Paper Industry by Eoghan Casey, BS, MA
Cover of the book Novel Fire Retardant Polymers and Composite Materials by Eoghan Casey, BS, MA
Cover of the book Advances in Intelligent Vehicles by Eoghan Casey, BS, MA
Cover of the book The Clinician’s Guide to Treatment and Management of Youth with Tourette Syndrome and Tic Disorders by Eoghan Casey, BS, MA
Cover of the book Modeling Business Objects with XML Schema by Eoghan Casey, BS, MA
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy