图书介绍

Digital Evidence and Computer Crimepdf电子书版本下载

Digital Evidence and Computer Crime
  • Eoghan Casey BS MA 著
  • 出版社: Academic Press
  • ISBN:0123742681
  • 出版时间:2011
  • 标注页数:807页
  • 文件大小:201MB
  • 文件页数:832页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

Digital Evidence and Computer CrimePDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART 1 Digital Forensics 3

CHAPTER 1 Foundations of Digital Forensics&Eoghan Casey 3

1.1 Digital Evidence 7

1.2 Increasing Awareness of Digital Evidence 9

1.3 Digital Forensics: Past, Present, and Future 10

1.4 Principles of Digital Forensics 14

1.5 Challenging Aspects of Digital Evidence 25

1.6 Following the Cybertrail 28

1.7 Digital Forensics Research 32

1.8 Summary 32

CHAPTER 2 Language Of Computer Crime Investigation&Eoghan Casey 35

2.1 Language of Computer Crime Investigation 36

2.2 The Role of Computers in Crime 39

2.3 Summary 47

CHAPTER 3 Digital Evidence in the Courtroom&Eoghan Casey 49

3.1 Duty of Experts 51

3.2 Admissibility 56

3.3 Levels of Certainty in Digital Forensics 68

3.4 Direct versus Circumstantial Evidence 72

3.5 Scientific Evidence 73

3.6 Presenting Digital Evidence 75

3.7 Summary 81

CHAPTER 4 Cybercrime Law: A United States Perspective&Susan W. Brenner 85

4.1 Federal Cybercrime Law 85

4.2 State Cybercrime Law 103

4.3 Constitutional Law 107

4.4 Fourth Amendment 107

4.5 Fifth Amendment and Encryption 115

CHAPTER 5 Cybercrime Law: A European Perspective&Bert-Jaap Koops and Tessa Robinson 123

5.1 The European and National Legal Frameworks 123

5.2 Progression of Cybercrime Legislation in Europe 126

5.3 Specific Cybercrime Offenses 129

5.4 Computer-Integrity Crimes 133

5.5 Computer-Assisted Crimes 149

5.6 Content-Related Cybercrimes 155

5.7 Other Offenses 173

5.8 Jurisdiction 178

5.9 Summary 182

PART 2 Digital Investigations 187

CHAPTER 6 Conducting Digital Investigations&Eoghan Casey and Bradley Schatz 187

6.1 Digital Investigation Process Models 187

6.2 Scaffolding for Digital Investigations 197

6.3 Applying the Scientific Method in Digital Investigations 201

6.4 Investigative Scenario: Security Breach 220

6.5 Summary 224

CHAPTER 7 Handling a Digital Crime Scene&Eoghan Casey 227

7.1 Published Guidelines for Handling Digital Crime Scenes 230

7.2 Fundamental Principles 232

7.3 Authorization 234

7.4 Preparing to Handle Digital Crime Scenes 238

7.5 Surveying the Digital Crime Scene 240

7.6 Preserving the Digital Crime Scene 245

7.7 Summary 253

CHAPTER 8 Investigative Reconstruction with Digital Evidence&Eoghan Casey and Brent E. Turvey 255

8.1 Equivocal Forensic Analysis 259

8.2 Victimology 266

8.3 Crime Scene Characteristics 268

8.4 Threshold Assessments 273

8.5 Summary 282

CHAPTER 9 Modus Operandi, Motive, and Technology 285&Brent E. Turvey 285

9.1 Axes to Pathological Criminals and Other Unintended Consequences 285

9.2 Modus Operandi 287

9.3 Technology and Modus Operandi 288

9.4 Motive and Technology 297

9.5 Current Technologies 303

9.6 Summary 304

PART 3 Apprehending Offenders 307

CHAPTER 10 Violent Crime and Digital Evidence&Eoghan Casey and Terrance Maguire 307

10.1 The Role of Computers in Violent Crime 308

10.2 Processing the Digital Crime Scene 312

10.3 Investigative Reconstruction 316

10.4 Conclusions 321

CHAPTER 11 Digital Evidence as Alibi&Eoghan Casey 323

11.1 Investigating an Alibi 324

11.2 Time as Alibi 326

11.3 Location as Alibi 327

11.4 Summary 328

CHAPTER 12 Sex Offenders on the Internet&Eoghan Casey, Monique M. Ferraro, and Michael McGrath 329

12.1 Old Behaviors, New Medium 332

12.2 Legal Considerations 335

12.3 Identifying and Processing Digital Evidence 338

12.4 Investigating Online Sexual Offenders 341

12.5 Investigative Reconstruction 349

12.6 Case Example: Scott Tyree 357

12.7 Case Example: Peter Chapman 360

12.8 Summary 362

CHAPTER 13 Computer Intrusions&Eoghan Casey and Christopher Daywalt 369

13.1 How Computer Intruders Operate 371

13.2 Investigating Computer Intrusions 377

13.3 Forensic Preservation of Volatile Data 388

13.4 Post-Mortem Investigation of a Compromised System 401

13.5 Investigation of Malicious Computer Programs 403

13.6 Investigative Reconstruction 406

13.7 Summary 419

CHAPTER 14 Cyberstalking&Eoghan Casey 421

14.1 How Cyberstalkers Operate 423

14.2 Investigating Cyberstalking 425

14.3 Cyberstalking Case Example 432

14.4 Summary 433

PART 4 Computers 437

CHAPTER 15 Computer Basics for Digital Investigators&Eoghan Casey 437

15.1 A Brief History of Computers 437

15.2 Basic Operation of Computers 439

15.3 Representation of Data 442

15.4 Storage Media and Data Hiding 447

15.5 File Systems and Location of Data 450

15.6 Dealing with Password Protection and Encryption 458

15.7 Summary 462

CHAPTER 16 Applying Forensic Science to Computers&Eoghan Casey 465

16.1 Preparation 466

16.2 Survey 467

16.3 Documentation 470

16.4 Preservation 474

16.5 Examination and Analysis 485

16.6 Reconstruction 499

16.7 Reporting 508

16.8 Summary 510

CHAPTER 17 Digital Evidence on Windows Systems&Eoghan Casey 513

17.1 File Systems 514

17.2 Data Recovery 529

17.3 Log Files 535

17.4 Registry 536

17.5 Internet Traces 538

17.6 Program Analysis 547

17.7 Summary 548

CHAPTER 18 Digital Evidence on UNIX Systems&Eoghan Casey 551

18.1 UNIX Evidence Acquisition Boot Disk 552

18.2 File Systems 552

18.3 Overview of Digital Evidence Processing Tools 557

18.4 Data Recovery 565

18.5 Log Files 574

18.6 File System Traces 575

18.7 Internet Traces 579

18.8 Summary 585

CHAPTER 19 Digital Evidence on Macintosh Systems&Eoghan Casey 587

19.1 File Systems 587

19.2 Overview of Digital Evidence Processing Tools 590

19.3 Data Recovery 591

19.4 File System Traces 592

19.5 Internet Traces 597

19.6 Summary 602

CHAPTER 20 Digital Evidence on Mobile Devices&Eoghan Casey and Benjamin Turnbull This chapter appears online at http://www.elsevierdirect.com/companion.jsp?ISBN=9780123742681 602

PART 5 Network Forensics 607

CHAPTER 21 Network Basics for Digital Investigators&Eoghan Casey and Benjamin Turnbull 607

21.1 A Brief History of Computer Networks 608

21.2 Technical Overview of Networks 609

21.3 Network Technologies 613

21.4 Connecting Networks Using Internet Protocols 619

21.5 Summary 631

CHAPTER 22 Applying Forensic Science to Networks&Eoghan Casey 633

22.1 Preparation and Authorization 634

22.2 Identification 640

22.3 Documentation, Collection, and Preservation 646

22.4 Filtering and Data Reduction 651

22.5 Class/Individual Characteristics and Evaluation of Source 653

22.6 Evidence Recovery 657

22.7 Investigative Reconstruction 659

22.8 Reporting Results 667

22.9 Summary 668

CHAPTER 23 Digital Evidence on the Internet&Eoghan Casey 671

23.1 Role of the Internet in Criminal Investigations 671

23.2 Internet Services: Legitimate versus Criminal Uses 672

23.3 Using the Internet as an Investigative Tool 685

23.4 Online Anonymity and Self-Protection 691

23.5 E-mail Forgery and Tracking 699

23.6 Usenet Forgery and Tracking 703

23.7 Searching and Tracking on IRC 706

23.8 Summary 711

CHAPTER 24 Digital Evidence on Physical and Data-Link Layers&Eoghan Casey 713

24.1 Ethernet 714

24.2 Linking the Data-Link and Network Layers: Encapsulation 716

24.3 Ethernet versus ATM Networks 721

24.4 Documentation, Collection, and Preservation 722

24.5 Analysis Tools and Techniques 727

24.6 Summary 736

CHAPTER 25 Digital Evidence at the Network and Transport Layers&Eoghan Casey 737

25.1 TCP/IP 738

25.2 Setting up a Network 750

25.3 TCP/IP-Related Digital Evidence 754

25.4 Summary 769

CASE INDEX 771

NAME INDEX 773

SUBJECT INDEX 775

精品推荐