Amazon Price: N/A (as of June 23, 2017 05:17 –
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
*A condensed hand-held guide complete with on-the-job tasks and checklists
Continue reading “Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides”
Amazon Price: $20.95 $17.43 You save: $3.52 (17%). (as of June 22, 2017 23:05 –
Hackers are out to get you . . . but these experts are on the job to stop them! Cybercrime is a growing problem, affecting businesses, governments, and individuals. A growing number of computer wizards are using science to prevent crime . . . or track down the cybercriminals. Visit this secret world inside! Every book in the SCIENTISTS IN ACTION! series takes you on a journey where science and adventure meet. Science is not just for the classroom or the labits a living, breathing, exciting part of our world today. Throw off that lab coat and get out and do some science! Each title in this series contains color photos, insider quotes from real scientists in the field, recent news items highlighting the excitement of each field, and back matter including: an index, further reading lists for books and internet resources, and a series glossary. Mason Crests editorial team has placed Key Icons to Look for throughout the books in this series in an effort to encourage library readers to build knowledge, gain awareness, explore possibilities and expand their viewpoints through our content rich non-fiction books. Key Icons are as follows: Words to Understand are shown at the front of each chapter with definitions. These words are then used in the prose throughout that chapter, and are emboldened, so that the reader is able to reference back to the definitions- building their vocabulary and enhancing their reading comprehension. Sidebars are highlighted graphics with content rich material within that allows readers to build knowledge and broaden their perspectives by weaving together additional information to provide realistic and holistic perspectives. Text Dependent Questions are placed at the end of each chapter. They challenge the readers comprehension of the chapter they have just read, while sending the reader back to th
Amazon Price: $59.95 $42.48 You save: $17.47 (29%). (as of June 22, 2017 21:37 –
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.
Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.
. Learn the tools and investigative principles of both physical and digital cybercrime investigations-and how they fit together to build a solid and complete case.
. Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard."
. The only book to combine physical and digital investigative techniques.
Amazon Price: $40.00 $20.09 You save: $19.91 (50%). (as of June 22, 2017 17:02 –
Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.
You’ll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, follow a sound investigative process, safely store evidence, and verify your findings. Best practices for documenting your results, preparing reports, and presenting evidence in court are also covered in this detailed resource.
Computer Forensics: InfoSec Pro Guide features: Lingo—Common security terms defined so that you’re in the know on the job IMHO—Frank and relevant opinions based on the author’s years of industry experience Budget Note—Tips for getting security technologies and processes into your organization’s budget In Actual Practice—Exceptions to the rules of security explained in real-world contexts Your Plan—Customizable checklists you can use on the job now Into Action—Tips on how, why, and when to apply new skills and techniques at work
Amazon Price: N/A (as of June 23, 2017 01:27 –
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime, now in its third edition, providing advanced material from specialists in each area of Digital Forensics.
This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind.
Continue reading “Handbook of Digital Forensics and Investigation”