Handbook of computer crime investigation : forensic tools and technology /

Detailed technical information is presented that can be used to help solve crime involving computers, for professionals who are already familiar with digital evidence. The handbook tells how to locate and use evidence in computer hard drives, shared networks, wireless devices, and embedded systems....

Full description

Saved in:
Bibliographic Details
Other Authors: Casey, Eoghan
Format: Book
Language:English
Published: San Diego, Calif. : Academic Press, c2002
San Diego, Calif. : [2002]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 06958nam a2200913Ia 4500
001 5c78e85f-2f07-42ae-87c0-e2576e94a121
005 20240903000000.0
008 011119t20022002cau b 001 0 eng d
010 |a  2001095720 
010 |a 2001095720 
010 |a ^^2001095720 
019 |a 48450441  |a 788697286 
020 |a 0121631036 
035 |9 FPL8436YL 
035 |a (NcD)003047870DUK01 
035 |a (OCoLC)47194007  |z (OCoLC)48450441  |z (OCoLC)788697286 
035 |a (OCoLC)47194007 
035 |a (OCoLC)ocm47194007 
035 |a (OCoLC)ocn686466440 
035 |a (PU)3143061-penndb-Voyager 
035 |a 3143061 
035 |a 47194007 
035 |a 4905220 
040 |a TOE  |b eng  |c TOE  |d CUM  |d NDD 
040 |a TOE  |b eng  |c TOE  |d CUM  |d PU 
040 |a TOE  |c TOE  |d CUM  |d IQU  |d DLC  |d UtOrBLW  |d OrLoB-B 
040 |a TOE  |c TOE  |d CUM  |d IQU  |d DLC 
040 |a TOE  |c TOE  |d CUM 
042 |a pcc 
049 |a PAUU 
050 0 0 |a HV8079.C65  |b H36 2002 
050 9 9 |a HV8079.C65  |b H36 2002 
079 |a ocm47194007 
082 0 0 |a 363.25/968  |2 21 
090 |a HV8079.C65  |b H36 2002 
092 |a 363.25968  |b H236, 2002 
245 0 0 |a Handbook of computer crime investigation :  |b forensic tools and technology /  |c edited by Eoghan Casey 
246 3 0 |a Computer crime investigation 
260 |a San Diego, Calif. :  |b Academic Press,  |c c2002 
264 1 |a San Diego, Calif. :  |b Academic Press,  |c [2002] 
264 4 |c ©2002 
300 |a xiv, 448 p. :  |b ill. ;  |c 24 cm 
300 |a xiv, 448 p. ;  |c 24 cm 
300 |a xiv, 448 pages ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
500 |a Includes index 
500 |a This WorldCat-derived record is shareable under Open Data Commons ODC-BY, with attribution to OCLC  |5 CTY 
504 |a Includes bibliographical references and index 
504 |a Includes bibliographical references and indexes 
505 0 |a The other side of civil discovery / Troy Larson -- The EnCase process / John Patzakis -- Incident response tools / Steve Romig -- NFR security / Karen Frederick -- Tool testing and analytical methodology / Curt Bryson and Scott Stevens -- Forensic analysis of Windows systems / Bob Sheldon -- UNIX system analysis / Keith Seglem, Mark Luque, and Sigurd Murphy -- Network analysis / Eoghan Casey, Troy Larson, and H. Morrow Long -- Wireless network analysis / K. Edward Gibbs and David F. Clark -- Embedded systems analysis / Ronald van der Knijff -- Homicide and child pornography / J.J. McLean -- Investigating internet gambling / Todd G. Shipley -- Computer intrusions / Steve Romig 
505 0 0 |g Ch. 1  |t Introduction /  |r Eoghan Casey and Keith Seglem --  |g Ch. 2.  |t The Other Side of Civil Discovery /  |r Troy Larson --  |g Ch. 3.  |t The Encase Process /  |r John Patzakis --  |g Ch. 4.  |t Incident Response Tools /  |r Steve Romig --  |g Ch. 5.  |t NFR Security /  |r Karen Frederick --  |g Ch. 6.  |t Tool Testing and Analytical Methodology /  |r Curt Bryson and Scott Stevens --  |g Ch. 7.  |t Forensic Analysis of Windows Systems /  |r Bob Sheldon --  |g Ch. 8.  |t Unix System Analysis /  |r Keith Seglem, Mark Luque and Sigurd Murphy --  |g Ch. 9.  |t Network Analysis /  |r Eoghan Casey, Troy Larson and H. Morrow Long --  |g Ch. 10.  |t Wireless Network Analysis /  |r K. Edward Gibbs and David F. Clark --  |g Ch. 11.  |t Embedded Systems Analysis /  |r Ronald van der Knijff --  |g Ch. 12.  |t Homicide and Child Pornography /  |r J. J. McLean --  |g Ch. 13.  |t Investigating Internet Gambling /  |r Todd G. Shipley --  |g Ch. 14.  |t Computer Intrusions /  |r Steve Romig. 
520 |a Detailed technical information is presented that can be used to help solve crime involving computers, for professionals who are already familiar with digital evidence. The handbook tells how to locate and use evidence in computer hard drives, shared networks, wireless devices, and embedded systems. Advantages and disadvantages of software and hardware for collecting and analyzing digital evidence are discussed, and instructions are given for collecting and analyzing digital evidence in common situations. Case examples demonstrate technical, legal, and practical challenges. Casey is a system security administrator for Yale University. Annotation copyrighted by Book News Inc., Portland, OR 
583 1 |a committed to retain  |c 20181001  |d in perpetuity  |f ReCAP Shared Collection  |5 HUL  |8 222053048580003941 
650 0 |a Computer crimes  |x Investigation  |v Handbooks, manuals, etc 
650 0 |a Computer crimes  |x Investigation 
650 0 |a Evidence, Criminal  |v Handbooks, manuals, etc 
650 0 |a Evidence, Criminal 
650 0 |a Forensic sciences  |v Handbooks, manuals, etc 
650 0 |a Forensic sciences 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Evidence, Criminal  |2 fast 
650 7 |a Forensic sciences  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
700 1 |a Casey, Eoghan  |0 http://viaf.org/viaf/sourceID/LC|no00092111 
700 1 |a Casey, Eoghan  |1 http://viaf.org/viaf/6944400/ 
700 1 |a Casey, Eoghan 
776 0 |w (OCoLC)790805953  |w (NO-TrBIB)120753057 
999 1 0 |i 5c78e85f-2f07-42ae-87c0-e2576e94a121  |l 4905220  |s US-CTY  |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p 
999 1 0 |i 5c78e85f-2f07-42ae-87c0-e2576e94a121  |l 6243701  |s US-ICU  |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p 
999 1 0 |i 5c78e85f-2f07-42ae-87c0-e2576e94a121  |l 990087553950203941  |s US-MH  |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p 
999 1 0 |i 5c78e85f-2f07-42ae-87c0-e2576e94a121  |l 990030478700108501  |s US-NCD  |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p 
999 1 0 |i 5c78e85f-2f07-42ae-87c0-e2576e94a121  |l 9931430613503681  |s US-PU  |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p 
999 1 1 |l 4905220  |s ISIL:US-CTY  |t BKS  |a sml  |b 39002056528319  |c HV8079 C65 H36 2002 (LC)  |g 1  |v 1 piece  |x circ  |y 3914929  |p LOANABLE 
999 1 1 |l 6243701  |s ISIL:US-ICU  |t BKS  |a DLL-Law  |b 62691701  |c HV8079.C65 H36 2002  |d Library of Congress classification  |y 8140906  |p LOANABLE 
999 1 1 |l 990087553950203941  |s ISIL:US-MH  |t BKS  |a LAW HD  |b 32044066221425  |c HV8079.C65 H36 2002  |d 0  |x 01 BOOK  |y 232053048530003941  |p LOANABLE 
999 1 1 |l 990030478700108501  |s ISIL:US-NCD  |t BKS  |a LSC PSK  |b D02357722S  |c HV8079.C65 H36 2002  |d 0  |x BOOK  |y 23617671510008501  |p LOANABLE 
999 1 1 |l 9931430613503681  |s ISIL:US-PU  |t BKS  |a VanPeltLib vanp  |b 31198032390747  |c HV8079.C65 H36 2002  |d 0  |x BOOK  |y 23358552390003681  |p LOANABLE