Table of Contents for
System Forensics, Investigation, and Response, 3rd Edition
Close
Version ebook
/
Retour
System Forensics, Investigation, and Response, 3rd Edition
by Easttom
Published by Jones & Bartlett Learning, 2017
Cover Page
Contents
System Forensics, Investigation, and Response
Title Page
Copyright Page
Content
Preface
About the Author
PART I Introduction to Forensics
CHAPTER 1 Introduction to Forensics
What Is Computer Forensics?
Understanding the Field of Digital Forensics
Knowledge Needed for Computer Forensics Analysis
The Daubert Standard
U.S. Laws Affecting Digital Forensics
Federal Guidelines
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 1 ASSESSMENT
CHAPTER 2 Overview of Computer Crime
How Computer Crime Affects Forensics
Identity Theft
Hacking
Cyberstalking and Harassment
Fraud
Non-Access Computer Crimes
Cyberterrorism
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 2 ASSESSMENT
CHAPTER 3 Forensic Methods and Labs
Forensic Methodologies
Formal Forensic Approaches
Documentation of Methodologies and Findings
Evidence-Handling Tasks
How to Set Up a Forensic Lab
Common Forensic Software Programs
Forensic Certifications
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 3 ASSESSMENT
PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 4 Collecting, Seizing, and Protecting Evidence
Proper Procedure
Handling Evidence
Storage Formats
Forensic Imaging
RAID Acquisitions
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 4 ASSESSMENT
CHAPTER LAB
CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information
Steganography
Encryption
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 5 ASSESSMENT
CHAPTER 6 Recovering Data
Undeleting Data
Recovering Information from Damaged Media
File Carving
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 6 ASSESSMENT
CHAPTER 7 Email Forensics
How Email Works
Email Protocols
Email Headers
Tracing Email
Email Server Forensics
Email and the Law
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 7 ASSESSMENT
CHAPTER 8 Windows Forensics
Windows Details
Volatile Data
Windows Swap File
Windows Logs
Windows Directories
Index.dat
Windows Files and Permissions
The Registry
Volume Shadow Copy
Memory Forensics
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 8 ASSESSMENT
CHAPTER 9 Linux Forensics
Linux and Forensics
Linux Basics
Linux File Systems
Linux Logs
Linux Directories
Shell Commands for Forensics
Kali Linux Forensics
Forensics Tools for Linux
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 9 ASSESSMENT
CHAPTER 10 Macintosh Forensics
Mac Basics
Macintosh Logs
Directories
Macintosh Forensic Techniques
How to Examine a Mac
Can You Undelete in Mac?
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 10 ASSESSMENT
CHAPTER 11 Mobile Forensics
Cellular Device Concepts
What Evidence You Can Get from a Cell Phone
Seizing Evidence from a Mobile Device
JTAG
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 11 ASSESSMENT
CHAPTER 12 Performing Network Analysis
Network Packet Analysis
Network Traffic Analysis
Router Forensics
Firewall Forensics
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 12 ASSESSMENT
PART III Incident Response and Resources
CHAPTER 13 Incident and Intrusion Response
Disaster Recovery
Preserving Evidence
Adding Forensics to Incident Response
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 13 ASSESSMENT
CHAPTER 14 Trends and Future Directions
Technical Trends
Legal and Procedural Trends
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 14 ASSESSMENT
CHAPTER 15 System Forensics Resources
Tools to Use
Resources
Laws
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 15 ASSESSMENT
APPENDIX A Answer Key
APPENDIX B Standard Acronyms
Glossary of Key Terms
References
Index
Next
Next Chapter
System Forensics, Investigation, and Response
Next
Next Chapter
System Forensics, Investigation, and Response