Handbook of Digital Forensics and Investigation

Editor/Author Casey, Eoghan
Publication Year: 2009
Publisher: Elsevier Science & Technology

Single-User Purchase Price: $62.34
Unlimited-User Purchase Price: $93.51
ISBN: 978-0-12-374267-4
Category: Social Sciences - Criminology & Law
Image Count: 229
Book Status: Available
Table of Contents

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime, now in its third edition, providing advanced material from specialists in each area of Digital Forensics. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology).

Share this

Table of Contents

  • Contributors
  • Foreword
  • About the Authors
  • Acknowledgements
  • Chapter 1 Introduction - Eoghan Casey
  • Part 1 Investigative Methodology
  • Chapter 2 Forensic Analysis - Eoghan Casey and Curtis W. Rose
  • Chapter 3 Electronic Discovery - James O. Holley, Paul H. Luehr, Jessica Reust Smith, and Joseph J. Schwerha IV
  • Chapter 4 Intrusion Investigation - Eoghan Casey, Christopher Daywalt, and Andy Johnston
  • Part 2 Technology
  • Chapter 5 Windows Forensic Analysis - Ryan D. Pittman and Dave Shaver
  • Chapter 6 UNIX Forensic Analysis - Cory Altheide and Eoghan Casey
  • Chapter 7 Macintosh Forensic Analysis - Anthony Kokocinski
  • Chapter 8 Embedded Systems Analysis - Ronald van der Knijff
  • Chapter 9 Network Investigations - Eoghan Casey, Christopher Daywalt, Andy Johnston, and Terrance Maguire
  • Chapter 10 Mobile Network Investigations - Dario Forte and Andrea de Donno