Cyber Crime Investigator's Field Guide
By Bruce Middleton - Information Security Consultant, St. Petersburg, FL, USA
Contains sample questions to ask the client during
the initial contact Covers the steps to follow when the investigator arrives at the client's site Details how to use various evidence collection and analysis tools Illustrates computer forensic tools in action with a case study Provides computer forensic software tools commands, attack signatures, Cisco PIX firewall command, and more |
Long gone are the days when a computer took up an entire room. Now we have computers
at home, laptops that travel just about anywhere, and data networks that allow
us to transmit information from virtually any location in a timely and efficient
manner. What have these advancements brought us? Another arena for criminal
activity. If someone wants to focus and target something, more than likely they
will obtain what they want. We shouldn't expect it to be any different in cyberspace.
Cyber Crime Field Handbook provides the details of investigating computer crime
from soup to nuts. It covers everything from what to do upon arrival at the
scene until the investigation is complete, including chain of evidence. You
get easy access to information such as:
Questions to ask the client Steps to follow when you arrive at the client's site Procedures for collecting evidence Details on how to use various evidence collection and analysis tools How to recover lost passwords or documents that are password protected Commonly asked questions with appropriate answers Recommended reference materials A case study to see the computer forensic tools in action Commonly used UNIX/Linux commands Port number references for various services and applications Computer forensic software tools commands synopsis Attack signatures Cisco PIX firewall commands |
We now have software and hardware to protect our data communication systems.
We have laws that provide law enforcement more teeth to take a bite out of cyber
crime. Now we need to combine understanding investigative techniques and technical
knowledge of cyberspace. That's what this book does.
Table of Contents
The Initial Contact |
Disk Search 32 EnCase Analyst's Notebook and iBase BackTracing Password Recovery Questions and Answers By Subject Area Evidence Collection Legal UNIX Military Hackers BackTracing Logs Encryption Government Networking Usenet and IRC (Chat) Recommended Reference Materials PERL and C Scripts UNIX, Windows, NetWare, and Macintosh Computer Internals Computer Networks Web Sites of Interest Case Study Appendix A: Glossary Appendix B: Port Numbers Used by Malicious Trojan Horse Programs Appendix C: Attack Signatures Appendix D: UNIX/Linux Commands Appendix E: Cisco PIX Firewall Commands Appendix F: Discovering Unauthorized Access to Your Computer Appendix G: Department of Justice Search and Seizure Guidel |
Cyber Crime Field Handbook provides the investigative framework, a knowledge
of how cyberspace really works, and the tools to investigate cyber crime…tools
that tell you the who, where, what, when, why, and how.
Cyber Crime Investigator's Field Guide ,360 pages, $69.95
HOW TO ORDER:
TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!
[Order
Online Now]
Other Ways To Order:
Order by phone @ 512-719-3595
Order by fax @ 512-719-3594Order by mail @
Thomas Investigative Publications, Inc.
P O Box 82148, Austin Texas, 78708
Insured UPS shipping: $12.00
Thomas Investigative Publications, Inc.
The World's Largest And Most Extensive Library Of
Books And Manuals On Investigation
P O Box 82148, Austin Texas, 78708
Copyright: 2003, TIPI
All Rights Reserved