Synopses & Reviews
Guide to Computer Forensics and Investigation presents methods to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification.
Synopsis
This text offers a disciplined approach to implementing a comprehensive accident-response plan with a focus on being able to detect intruders, discover what damage they did and discover their identities.
About the Author
Amelia Phillips is a graduate of the Massachusetts Institute of Technology and has worked for over 25 years in government, private industry, and academics. She has designed Distance Education classes, E-Commerce, Computer Forensics and Network Security programs at several community colleges. Amelia is Division Chair at Highline Community College and is a Fulbright Scholar. Bill Nelson has been a computer forensics examiner for a Fortune 50 company for the past 12 years and has developed high-tech investigation programs for professional organizations and colleges. His previous experience includes AFIS software engineering and reserve police work. Frank Enfinger, from Suquamish, Washington, is a tenured faculty member at North Seattle Community College and a Computer Forensics Specialist with a local police department. He holds a degree in Computer Science. Christopher Steuart is one of the founders and the staff attorney for itforensics.com. Previously, he was an Information Security Officer for a Fortune 50 company and the United States government. Chris resides in Seattle, Washington.
Table of Contents
1. Computer Forensics and Investigations as a Profession 2. Understanding Computer Investigations 3. Working with Windows and DOS Systems 4. Macintosh and Linux Boot Processes and Disk Structures 5. The Investigators Office and Laboratory 6. Current Computer Forensics Tools 7. Digital Evidence Controls 8. Processing Crime and Incident Scenes 9. Data Acquisition 10. Computing Forensic Analysis 11. E-mail Investigations 12. Recovering Image Files 13. Written Investigation Reports 14. Becoming an Expert Witness Appendices A: Certification Test References B: Computer Forensics References C: Procedures for Corporate High-Technology Investigations