Skip to content
Paperback Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) Book

ISBN: 1584500182

ISBN13: 9781584500186

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM)

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$5.59
Save $119.40!
List Price $124.99
Almost Gone, Only 4 Left!

Book Overview

Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an... This description may be from another edition of this product.

Customer Reviews

6 ratings

Broken CD-ROM

I receive it today BUT the CD-ROM was broken.

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)

Computer Forensics is very appropriate considering a number of data storage facilities that have been recently hacked into, resulting in theft of customer data. The subject matter of computer forsenic is logically presented from grounds up leading to a volume of valuable information. I was impressed with the case studies that appear in the appendix. The end of chapter exercises should be very useful, and thus could be adapted in a teaching environment. This text should form a companinon to the author's other text on Firewalls.

General Comments

This book is quite an applicable book in today's world. Inappropriate use of the computer technology in identity theft, terrorism, etc. is becoming a growing problem. The widespread use of the Internet by government and private institutions opens a bigger gateway for the misuse of their computer systems. All institutions whose computer firewalls have failed to prevent attacks from internal and external elements can use the information provided in this book. This book introduces the reader to a variety of tools and workshops that are available. The book shows how to use compromised computer systems as crime scenes to obtain the necessary evidence for the committed crime. It points out that the country's criminal courts are finding the evidences collected from computer forensics investigations increasingly admissible due to the improved level of computer forensics tools.

Great Book

If you're interested in cyber crime and how cyber criminals are caught, "Computer Forensics" by John Vacca is the book for you. I found this book to be a wealth of information on both the tools and techniques used by law enforcement to catch cyber criminals. "Computer Forensics" is an easy to read well written book on an interesting subject and the level of detail provided is amazing. I recommend this book to anyone in the information technology field.

Informed Forensics Investigation

This second edition gives the reader a comprehensive overview of computer forensics from information security issues to data recovery techniques. It helps you to understand auditing methods from terrorist cyber-attacks. The second addition includes Evidence Identification and Checklist forms, hands-on projects, exercises, and case studies for each chapter. The CD included with the book has tools, presentations, and demos of the latest computer forensics software. If you look through the selected topics you will find the way to protect the software that you use the most in your transactions. This includes: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verification; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms. The cost of this book is a small price to pay for this current knowledge and protection to your data and information.

How to catch a thief.

The second edition of this comprehensive text details how to analyze and conduct a forensic examination which will lead to identifying and prosecuting data thieves. This book provides examples, case studies and check lists to aid in the learning process. In addition, a CD-ROM provides forensic software tools and documentation. This text is especially beneficial to law enforcement professionals or anyone responsible for data security.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured