The Language of SQL (2nd Edition) (Learning) | Guide to Computer Forensics and Investigations | Guide to Computer Forensics and Investigations | EnCase Computer Forensics | Practical Malware Analysis | Corporate Fraud Handbook | Legal Issues in Information Security | The Computer Incident Response Planning Handbook | Discovering Statistics
The field of computer forensics has experienced significant growth recently and those looking to get into the industry have significant opportunity for upward mobility. Focusing on the concepts investigators need to know to conduct a thorough investigation, Digital Forensics Explained provides an overall description of the forensic practice from a practitionerâs perspective.
Starting with an overview, the text describes best practices based on the authorâs decades of experience conducting investigations and working in information technology. It illustrates the forensic process, explains what it takes to be an investigator, and highlights emerging trends. Filled with helpful templates and contributions from seasoned experts in their respective fields, the book includes coverage of:
- Internet and email investigations
- Mobile forensics for cell phones, iPads, music players, and other small devices
- Cloud computing from an architecture perspective and its impact on digital forensics
- Anti-forensic techniques that may be employed to make a forensic exam more difficult to conduct
- Recoverability of information from damaged media
- The progression of a criminal case from start to finish
- Tools that are often used in an examination, including commercial, free, and open-source tools; computer and mobile tools; and things as simple as extension cords
- Social media and social engineering forensics
- Case documentation and presentation, including sample summary reports and a cover sheet for a cell phone investigation
The text includes acquisition forms, a sequential process outline to guide your investigation, and a checklist of supplies youâll need when responding to an incident. Providing you with the understanding and the tools to deal with suspects who find ways to make their digital activities hard to trace, the book also considers cultural implications, ethics, and the psychological effects that digital forensics investigations can have on investigators.