Digital Evidence and Computer CrimePDF电子书下载
- 电子书积分:22 积分如何计算积分?
- 作 者:Eoghan Casey BS MA
- 出 版 社:Academic Press
- 出版年份:2011
- ISBN:0123742681
- 页数:807 页
PART 1 Digital Forensics 3
CHAPTER 1 Foundations of Digital Forensics&Eoghan Casey 3
1.1 Digital Evidence 7
1.2 Increasing Awareness of Digital Evidence 9
1.3 Digital Forensics: Past, Present, and Future 10
1.4 Principles of Digital Forensics 14
1.5 Challenging Aspects of Digital Evidence 25
1.6 Following the Cybertrail 28
1.7 Digital Forensics Research 32
1.8 Summary 32
CHAPTER 2 Language Of Computer Crime Investigation&Eoghan Casey 35
2.1 Language of Computer Crime Investigation 36
2.2 The Role of Computers in Crime 39
2.3 Summary 47
CHAPTER 3 Digital Evidence in the Courtroom&Eoghan Casey 49
3.1 Duty of Experts 51
3.2 Admissibility 56
3.3 Levels of Certainty in Digital Forensics 68
3.4 Direct versus Circumstantial Evidence 72
3.5 Scientific Evidence 73
3.6 Presenting Digital Evidence 75
3.7 Summary 81
CHAPTER 4 Cybercrime Law: A United States Perspective&Susan W. Brenner 85
4.1 Federal Cybercrime Law 85
4.2 State Cybercrime Law 103
4.3 Constitutional Law 107
4.4 Fourth Amendment 107
4.5 Fifth Amendment and Encryption 115
CHAPTER 5 Cybercrime Law: A European Perspective&Bert-Jaap Koops and Tessa Robinson 123
5.1 The European and National Legal Frameworks 123
5.2 Progression of Cybercrime Legislation in Europe 126
5.3 Specific Cybercrime Offenses 129
5.4 Computer-Integrity Crimes 133
5.5 Computer-Assisted Crimes 149
5.6 Content-Related Cybercrimes 155
5.7 Other Offenses 173
5.8 Jurisdiction 178
5.9 Summary 182
PART 2 Digital Investigations 187
CHAPTER 6 Conducting Digital Investigations&Eoghan Casey and Bradley Schatz 187
6.1 Digital Investigation Process Models 187
6.2 Scaffolding for Digital Investigations 197
6.3 Applying the Scientific Method in Digital Investigations 201
6.4 Investigative Scenario: Security Breach 220
6.5 Summary 224
CHAPTER 7 Handling a Digital Crime Scene&Eoghan Casey 227
7.1 Published Guidelines for Handling Digital Crime Scenes 230
7.2 Fundamental Principles 232
7.3 Authorization 234
7.4 Preparing to Handle Digital Crime Scenes 238
7.5 Surveying the Digital Crime Scene 240
7.6 Preserving the Digital Crime Scene 245
7.7 Summary 253
CHAPTER 8 Investigative Reconstruction with Digital Evidence&Eoghan Casey and Brent E. Turvey 255
8.1 Equivocal Forensic Analysis 259
8.2 Victimology 266
8.3 Crime Scene Characteristics 268
8.4 Threshold Assessments 273
8.5 Summary 282
CHAPTER 9 Modus Operandi, Motive, and Technology 285&Brent E. Turvey 285
9.1 Axes to Pathological Criminals and Other Unintended Consequences 285
9.2 Modus Operandi 287
9.3 Technology and Modus Operandi 288
9.4 Motive and Technology 297
9.5 Current Technologies 303
9.6 Summary 304
PART 3 Apprehending Offenders 307
CHAPTER 10 Violent Crime and Digital Evidence&Eoghan Casey and Terrance Maguire 307
10.1 The Role of Computers in Violent Crime 308
10.2 Processing the Digital Crime Scene 312
10.3 Investigative Reconstruction 316
10.4 Conclusions 321
CHAPTER 11 Digital Evidence as Alibi&Eoghan Casey 323
11.1 Investigating an Alibi 324
11.2 Time as Alibi 326
11.3 Location as Alibi 327
11.4 Summary 328
CHAPTER 12 Sex Offenders on the Internet&Eoghan Casey, Monique M. Ferraro, and Michael McGrath 329
12.1 Old Behaviors, New Medium 332
12.2 Legal Considerations 335
12.3 Identifying and Processing Digital Evidence 338
12.4 Investigating Online Sexual Offenders 341
12.5 Investigative Reconstruction 349
12.6 Case Example: Scott Tyree 357
12.7 Case Example: Peter Chapman 360
12.8 Summary 362
CHAPTER 13 Computer Intrusions&Eoghan Casey and Christopher Daywalt 369
13.1 How Computer Intruders Operate 371
13.2 Investigating Computer Intrusions 377
13.3 Forensic Preservation of Volatile Data 388
13.4 Post-Mortem Investigation of a Compromised System 401
13.5 Investigation of Malicious Computer Programs 403
13.6 Investigative Reconstruction 406
13.7 Summary 419
CHAPTER 14 Cyberstalking&Eoghan Casey 421
14.1 How Cyberstalkers Operate 423
14.2 Investigating Cyberstalking 425
14.3 Cyberstalking Case Example 432
14.4 Summary 433
PART 4 Computers 437
CHAPTER 15 Computer Basics for Digital Investigators&Eoghan Casey 437
15.1 A Brief History of Computers 437
15.2 Basic Operation of Computers 439
15.3 Representation of Data 442
15.4 Storage Media and Data Hiding 447
15.5 File Systems and Location of Data 450
15.6 Dealing with Password Protection and Encryption 458
15.7 Summary 462
CHAPTER 16 Applying Forensic Science to Computers&Eoghan Casey 465
16.1 Preparation 466
16.2 Survey 467
16.3 Documentation 470
16.4 Preservation 474
16.5 Examination and Analysis 485
16.6 Reconstruction 499
16.7 Reporting 508
16.8 Summary 510
CHAPTER 17 Digital Evidence on Windows Systems&Eoghan Casey 513
17.1 File Systems 514
17.2 Data Recovery 529
17.3 Log Files 535
17.4 Registry 536
17.5 Internet Traces 538
17.6 Program Analysis 547
17.7 Summary 548
CHAPTER 18 Digital Evidence on UNIX Systems&Eoghan Casey 551
18.1 UNIX Evidence Acquisition Boot Disk 552
18.2 File Systems 552
18.3 Overview of Digital Evidence Processing Tools 557
18.4 Data Recovery 565
18.5 Log Files 574
18.6 File System Traces 575
18.7 Internet Traces 579
18.8 Summary 585
CHAPTER 19 Digital Evidence on Macintosh Systems&Eoghan Casey 587
19.1 File Systems 587
19.2 Overview of Digital Evidence Processing Tools 590
19.3 Data Recovery 591
19.4 File System Traces 592
19.5 Internet Traces 597
19.6 Summary 602
CHAPTER 20 Digital Evidence on Mobile Devices&Eoghan Casey and Benjamin Turnbull This chapter appears online at http://www.elsevierdirect.com/companion.jsp?ISBN=9780123742681 602
PART 5 Network Forensics 607
CHAPTER 21 Network Basics for Digital Investigators&Eoghan Casey and Benjamin Turnbull 607
21.1 A Brief History of Computer Networks 608
21.2 Technical Overview of Networks 609
21.3 Network Technologies 613
21.4 Connecting Networks Using Internet Protocols 619
21.5 Summary 631
CHAPTER 22 Applying Forensic Science to Networks&Eoghan Casey 633
22.1 Preparation and Authorization 634
22.2 Identification 640
22.3 Documentation, Collection, and Preservation 646
22.4 Filtering and Data Reduction 651
22.5 Class/Individual Characteristics and Evaluation of Source 653
22.6 Evidence Recovery 657
22.7 Investigative Reconstruction 659
22.8 Reporting Results 667
22.9 Summary 668
CHAPTER 23 Digital Evidence on the Internet&Eoghan Casey 671
23.1 Role of the Internet in Criminal Investigations 671
23.2 Internet Services: Legitimate versus Criminal Uses 672
23.3 Using the Internet as an Investigative Tool 685
23.4 Online Anonymity and Self-Protection 691
23.5 E-mail Forgery and Tracking 699
23.6 Usenet Forgery and Tracking 703
23.7 Searching and Tracking on IRC 706
23.8 Summary 711
CHAPTER 24 Digital Evidence on Physical and Data-Link Layers&Eoghan Casey 713
24.1 Ethernet 714
24.2 Linking the Data-Link and Network Layers: Encapsulation 716
24.3 Ethernet versus ATM Networks 721
24.4 Documentation, Collection, and Preservation 722
24.5 Analysis Tools and Techniques 727
24.6 Summary 736
CHAPTER 25 Digital Evidence at the Network and Transport Layers&Eoghan Casey 737
25.1 TCP/IP 738
25.2 Setting up a Network 750
25.3 TCP/IP-Related Digital Evidence 754
25.4 Summary 769
CASE INDEX 771
NAME INDEX 773
SUBJECT INDEX 775
- 《BASIC numerical mathematics》J C Mason MA 2222
- 《打造一个梦 创业成功的十六个秘密》(美)王安琪(Angi Ma Wong)著;郭建中译 1999
- 《移动智能》(加)Laurence T.Yang,(澳)Agustinus Borgy Waluyo,(日)Jianhua Ma,(澳)Ling Tan,(澳)Bala Srinivasan编著;卓力,张菁,李晓光,张新峰译 2014
- 《电工学及无线电工学教程 第2册》H.H.MAЛOB著;王世模译 1954
- 《近世几何学初编》(英)克济(John Casey)撰;李俨译 1956
- 《奥斯卡·尼迈耶》(巴西)约瑟夫·M. 博特(Josep Ma. Botey)著;张建华译 2005
- 《急症超声检查》(美)O. John Ma,(美)James R. Mateer著;申亚伟等译 2005
- 《药物基因组学 寻求个性化治疗》(德)Julio Licinio,(德) Ma-Li Wong主编;蒋华良等译 2005
- 《沉默的伤痕 日军慰安妇历史影像书》Sheng-mei Ma,赖采儿,吴慧玲,游茹棻著 2005
- 《酷MA萌的秘密》日本熊本县政府酷MA萌团队编;陈榕榕译 2017
- 《竞争战略 全译珍藏版》(美)迈克尔·波特(Michael E. Porter)著 2012
- 《网络互联技术手册 第2版》(美)(K.唐斯)Kevin Downes等著;包晓露等译 1999
- 《新版交换式以太网和快速型以太网 第2版》(美)(R.布雷耶)Robert Breyer,(美)(S.赖利)Sean Riley著;肖文贵等译 1997
- 《摄影100关键词》(英)克拉克著 2011
- 《守望百年 中英文对照爱情长诗》蔡丽双著;张智中译 2014
- 《环境政策概要》(英)卡罗琳·斯奈尔(Carolyn Snell)著;宋伟译 2017
- 《驼铃 中-英-波兰文对照诗集》蔡丽双著;张智中,(波兰)博古米娜·雅尼卡译 2015
- 《爱海情帆 中-英-罗马尼亚文对照爱情长诗》蔡丽双著;张智中,德拉戈斯·巴尔布译 2016
- 《准备,开始,哎哟》(美)弗兰·马努斯肯著;(美)黛安娜·帕尔米西若绘;魏亚西译 2014
- 《埋藏在后院》(美)盖尔·赫尔曼著;(美)杰里·斯马斯绘;筱舟译 2014