Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet

Rating: 
Amazon Price: $69.95 $44.82 You save: $25.13 (36%). (as of July 23, 2017 14:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The textbook teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Additionally, this third edition includes updated chapters dedicated to networked Windows, Unix, and Macintosh computers, and Personal Digital Assistants.

Ancillary materials include an Instructor's Manual and PowerPoint slides.Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks

Handbook of Digital Forensics and Investigation

Rating: 
Amazon Price: N/A (as of July 23, 2017 14:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime, now in its third edition, providing advanced material from specialists in each area of Digital Forensics.

This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind.
Continue reading “Handbook of Digital Forensics and Investigation”

Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data

Rating: 
Amazon Price: $150.00 $103.85 You save: $46.15 (31%). (as of July 23, 2017 01:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Incorporating currencies, payment methods, and protocols that computers use to talk to each other, digital currencies are poised to grow in use and importance. The Handbook of Digital Currency gives readers a way to learn about subjects outside their specialties and provides authoritative background and tools for those whose primary source of information is journal articles. Taking a cross-country perspective, its comprehensive view of the field includes history, technicality, IT, finance, economics, legal, tax and regulatory environment. For those who come from different backgrounds with different questions in mind, The Handbook of Digital Currency is an essential starting point.Discusses all major strategies and tactics associated with digital currencies, their uses, and their regulationsPresents future scenarios for the growth of digital currenciesWritten for regulators, crime prevention units, tax authorities, entrepreneurs, micro-financiers, micro-payment businesses, cryptography experts, software developers, venture capitalists, hedge fund managers, hardware manufacturers, credit card providers, money changers, remittance service providers, exchanges, and academics

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications

Amazon Price: $69.95 $63.59 You save: $6.36 (9%). (as of July 23, 2017 00:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Deception in the Digital Age: Exploiting and Defending Human Targets through Computer-Mediated Communication helps readers understand how to conduct a deep psychological profile and digital autopsy of malicious code attackers and their malware. Users will find an in-depth guide that provides valuable insights on the motivations and capabilities of attackers explained through a hybridized methodology of technical profiling that combines digital criminalistics with behavioral evidence to develop a profile of malicious code attackers.

The text provides a detailed analysis of the psychological, sociological, and technical indicators that reveal predictors of attacks and conversely post-mortem attribution of attackers, presenting a unique resource that empowers readers to both troubleshoot and protect their own computer networks. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with featured tools, diagrams, examples, exercises, and checklists that enhance the learning process.Presents a dual pronged approach to the investigation process that combines digital criminalistics and behavioral evidence to develop profiles of malicious code attackersWritten by leading information security experts with real-world investigative experienceExamines the group dynamics behind malicious code development and attacker groupsTeaches the specifics of malware code crime scene analysis and insider forensics

From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence

Rating: 
Amazon Price: N/A (as of July 23, 2017 05:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book outlines the background and overall vision for the Internet of Things (IoT) and Machine-to-Machine (M2M) communications and services, including major standards. Key technologies are described, and include everything from physical instrumentation of devices to the cloud infrastructures used to collect data. Also included is how to derive information and knowledge, and how to integrate it into enterprise processes, as well as system architectures and regulatory requirements. Real-world service use case studies provide the hands-on knowledge needed to successfully develop and implement M2M and IoT technologies sustainably and profitably. Finally, the future vision for M2M technologies is described, including prospective changes in relevant standards. This book is written by experts in the technology and business aspects of Machine-to-Machine and Internet of Things, and who have experience in implementing solutions.

Standards included: ETSI M2M, IEEE 802.15.4, 3GPP (GPRS, 3G, 4G), Bluetooth Low Energy/Smart, IETF 6LoWPAN, IETF CoAP, IETF RPL, Power Line Communication, Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE), ZigBee, 802.11, Broadband Forum TR-069, Open Mobile Alliance (OMA) Device Management (DM), ISA100.11a, WirelessHART, M-BUS, Wireless M-BUS, KNX, RFID, Object Management Group (OMG) Business Process Modelling Notation (BPMN)Key technologies for M2M and IoT covered: Embedded systems hardware and software, devices and gateways, capillary and M2M area networks, local and wide area networking, M2M Service Enablement, IoT data management and data warehousing, data analytics and big data, complex event processing and stream analytics, knowledge discovery and management, business process and enterprise integration, Software as a Service and cloud computingCombines both technical explanations together with design features of M2M/IoT and use cases. Together, these descriptions will assist you to develop solutions that will work in the real worldDetailed description of the network architectures and technologies that form the basis of M2M and IoTClear guidelines and examples of M2M and IoT use cases from real-world implementations such as Smart Grid, Smart Buildings, Smart Cities, Participatory Sensing, and Industrial AutomationA description of the vision for M2M and its evolution towards IoT