Skip to content
Paperback Handbook of Computer Crime Investigation: Forensic Tools and Technology Book

ISBN: 0121631036

ISBN13: 9780121631031

Handbook of Computer Crime Investigation: Forensic Tools and Technology

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$5.09
Save $76.86!
List Price $81.95
Almost Gone, Only 1 Left!

Book Overview

Following on the success of his introductory text, Digital Evidence and Computer Crime , Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are... This description may be from another edition of this product.

Customer Reviews

5 ratings

Hands-on, immediately applicable to our real-world cases

Eoghan Casey's text is immediately useful. It's not theory, it's practical. It's not biased to one operating system, but covers several technologies. Finally, Eoghan and the book's contributors do not gloss over today's most offensive topics, they address them with vigor and solutions. I would share one concern: the chapter-long product/vendor discussion. Some reviewers label it marketing; other reviewers don't mention it at all. I'll just forewarn you that you will learn much more about EnCase or NFR than about their competitors. As a security consultant for Hewlett-Packard, it seems my bookshelf fills up entirely too easily, especially as of the last few years. Therefore, I've gotten fairly selective with new book purchases (until I can get a new bookshelf). However, Casey's text is DEFINITELY worth getting - worth knocking another book off to make room. :) I hope you enjoy this comprehensive text at least half as much as I do.

Excellent for making your own Methodology

The book reviews different tools and techniques for a forensic investigation by experts in the field. Very good reference manual for new and experienced investigators.

A step on..

The 'Handbook of Computer Crime Investigation' follows on well from Eoghan Casey's previous title, 'Digital Evidence and Computer Crime' which I found to be a sound introduction to the subject. This latest book is targeted at those already proficient in Computer Forensics and provides in depth detail of techniques essential to any computer related investigation. Also included are sections specific to examining various operating systems. As someone who both works in information security and has a particular interest in computer forensics I can thoroughly recommend this book!

Essays by a variety of learned and experienced authors

Capably edited by Eoghan Casey (System Security Administrator, Yale University), Handbook Of Computer Crime Investigation: Forensic Tools And Technology is a fascinating guide to the software and hardware tools necessary for collecting digital evidence of cyber crimes ranging from cyberstalking and child pornography to financial fraud, espionage, or terrorism. Essays by a variety of learned and experienced authors present the latest means of forensic analysis for Windows, Unix, and more systems. Sample code, charts, and appropriate case examples pepper this amazing, cutting-edge criminology reference. Handbook Of Computer Crime Investigation is an invaluable and "user friendly" contribution to the field of computer and Internet security.

One of the best computer forensics books

The television show Quincy was a double-edged sword for the forensic community. It elevated the status and importance of the coroner. However, the speed at which Quincy was able to find answers was utterly unrealistic. By and large, within forensics -- be it computer or human forensics -- answers are found with slow, deliberate, and methodical steps, not in the undisciplined manner that is often portrayed in the media. In light of the growing number of computer crime incidents, computer forensics is taking on a critical role within information systems. The focus of computer forensics is twofold. First is the attempt to determine whether a breach has occurred and, if so, to determine the offender. Second is prosecution of the offender, if the breach was a criminal activity. With current information technology, the first part is easier, while prosecuting a computer criminal remains extremely difficult. The criticality of a specific topic is often portrayed in the number of titles that are available on that topic. Late 2001 and early 2002 have produced nearly a dozen books on computer forensics and cyber crime. Although computer forensics is becoming a mainstream topic, the fact that more books are being published on the subject does not mean in any way that the problem will go away quickly. With this in mind, the Handbook of Computer Crime Investigation provides information on dealing with cyber crime. Each book approaches the subject from a different angle. Eoghan Casey's Handbook of Computer Crime Investigation: Forensic Tools & Technology is an excellent work. The book has articles written by 17 authors with expertise in different areas of computer crime and forensics. The authors are from the fields of law enforcement and professional services, as well as computer forensic software firms. The editor, Eoghan Casey, does a good job of keeping a coherent and logical sequence throughout the book, which is often difficult in books with multiple authors. The variety of authors is what makes this book shine. Each author addresses a specific subject matter, and the chapters are written in a clear and concise fashion. The chapters on wireless networks and embedded systems -- critical topics in a forensic investigation -- are excellent. The Handbook of Computer Crime Investigation is one of the first books to include basic forensic information on these topics. The Handbook of Computer Crime Investigation was written to complement Casey's preceding book Digital Evidence and Computer Crime (Academic Press 2000; ISBN: 012162885X). The Handbook of Computer Crime Investigation provides different looks on the proper course of digital forensic collection. The "Case Examples" sections are extremely valuable because they provide readers with examples of the technical and legal issues that arise in real-world computer investigations. The book includes sections written by forensic tool vendors. The vendors do a good job of writing in a technical nature rather tha
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured