Cyber Crime Investigator's Field Guide
By Bruce Middleton - Information Security Consultant, St. Petersburg, FL, USA

Contains sample questions to ask the client during the initial contact
Covers the steps to follow when the investigator arrives at the client's site
Details how to use various evidence collection and analysis tools
Illustrates computer forensic tools in action with a case study
Provides computer forensic software tools commands, attack signatures, Cisco PIX firewall command, and more


Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace.
Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as:

Questions to ask the client
Steps to follow when you arrive at the client's site
Procedures for collecting evidence
Details on how to use various evidence collection and analysis tools
How to recover lost passwords or documents that are password protected
Commonly asked questions with appropriate answers
Recommended reference materials
A case study to see the computer forensic tools in action
Commonly used UNIX/Linux commands
Port number references for various services and applications
Computer forensic software tools commands synopsis
Attack signatures
Cisco PIX firewall commands



We now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does.

 

Table of Contents

The Initial Contact
Client Site Arrival
Evidence Collection Procedures
Detailed Procedures for Obtaining a Bitstream Backup of a Hard Drive
Evidence Collection and Analysis Tools
SafeBack
GetTime
FileList, FileCnvt, and Excel
GetFree
Swap Files and GetSwap
GetSlack
Temporary Files
Filter_I
Key Word Generation
TextSearch Plus
CRCMD5
DiskSig
Doc
Mcrypt
Micro-Zap
Map
M-Sweep
Net Threat Analyzer
AnaDisk
Seized
Scrub
Spaces
NTFS FileList
NTFS GetFree
NTFS GetSlack
NTFS View
NTFS Check
NTIcopy


Disk Search 32
EnCase
Analyst's Notebook and iBase
BackTracing
Password Recovery
Questions and Answers By Subject Area
Evidence Collection
Legal
UNIX
Military
Hackers
BackTracing
Logs
Encryption
Government
Networking
E-mail
Usenet and IRC (Chat)
Recommended Reference Materials
PERL and C Scripts
UNIX, Windows, NetWare, and Macintosh
Computer Internals
Computer Networks
Web Sites of Interest
Case Study
Appendix A: Glossary
Appendix B: Port Numbers Used by Malicious Trojan Horse Programs
Appendix C: Attack Signatures
Appendix D: UNIX/Linux Commands
Appendix E: Cisco PIX Firewall Commands
Appendix F: Discovering Unauthorized Access to Your Computer
Appendix G: Department of Justice Search and Seizure Guidel



Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime…tools that tell you the who, where, what, when, why, and how.

Cyber Crime Investigator's Field Guide ,360 pages, $69.95

 

HOW TO ORDER:
TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!

[Order Online Now]

Other Ways To Order:
Order by phone @ 512-719-3595
Order by fax @ 512-719-3594Order by mail @
Thomas Investigative Publications, Inc.
P O Box 82148, Austin Texas, 78708

Insured UPS shipping: $12.00


Thomas Investigative Publications, Inc.
The World's Largest And Most Extensive Library Of
Books And Manuals On Investigation
P O Box 82148, Austin Texas, 78708

Copyright: 2003, TIPI
All Rights Reserved