Nelson Higher Education

Higher Education

System Forensics, Investigation, and Response, 3rd Edition

  • Chuck Easttom
  • ISBN-10: 1284121844
  • ISBN-13: 9781284121841
  • 0 Pages | Paperback
  • COPYRIGHT: 2019 Published
Request a Copy for Review

Overview

About the Product

Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Part II addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, Part III explores emerging technologies as well as future directions of this interesting and cutting-edge field.

Features

  • Covers all aspects of forensics: procedures, legal issues, and scientific principles as well as specific hands on forensics with Windows, smart phones, memory, network forensics, and Macintosh forensics

  • New and expanded content on mobile device forensics, addressing the most current issues

  • Additional information on memory forensics

  • Updated and expanded coverage on legal issues

  • Significantly expanded material on Windows forensics

  • Includes information on how to write reports

  • Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios

About the Author

Chuck Easttom

Chuck Easttom has 15 years' experience in the IT industry and has been an expert witness on several computer-related cases. He is the author of ten computer-science books including two textbooks on computer security. He was also one of the subject matter experts who helped to create CompTIA's Security+ certification test. He has been a frequent guest speaker on computer security at various computer groups and campuses including Harvard and Columbia. He holds more than a dozen computer industry certifications.

Table of Contents

Part One: Introduction to Forensics
Chapter 1: Introduction to Forensics
Chapter 2: Overview of Computer Crime
Chapter 3: Forensic Methods and Labs

Part Two: Technical Overview: System Forensics Tools, Techniques, and Methods
Chapter 4: Collecting, Seizing, and Protecting Evidence
Chapter 5: Understanding Techniques for Hiding and Scrambling Information
Chapter 6: Recovering Data
Chapter 7: E-mail Forensics
Chapter 8: Windows Forensics
Chapter 9: Linux Forensics
Chapter 10: Macintosh Forensics
Chapter 11: Mobile Forensics
Chapter 12: Performing Network Analysis

Part Three: Incident Response and Resources
Chapter 13: Incident and Intrusion Response
Chapter 14: Trends and Future Directions
Chapter 15: System Forensics Resources

Appendix A: Answer Key
Appendix B: Standard Acronyms

New to this edition

  • New and expanded content on mobile device forensics, addressing the most current issues
  • Updated and expanded coverage on legal issues
  • Significantly expanded material on Windows forensics