ABSTRACT

Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities and how cyber forensics can uncover them.

chapter 1|26 pages

Introduction

chapter 2|22 pages

Cyber Forensic Tools and Utilities

chapter 3|68 pages

Concealment Techniques

chapter 4|26 pages

Hardware: Model System Platforms

chapter 9|14 pages

Forensic Black Bag

chapter 14|12 pages

Cyber Forensic Awareness: Management Survey