An Updated Edition of the Definitive Computer Forensics Text

Updated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence c...

Buy Now From Amazon

Product Review

An Updated Edition of the Definitive Computer Forensics Text

Updated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy, and administration.

  • Overview of computer forensics: This could include an introduction to the field of computer forensics, including its history, goals, and methods.
  • Cybercrime investigation: The book might cover different types of cybercrimes, such as cyberbullying, identity theft, and online fraud, and discuss how computer forensics can be used to investigate and prosecute these crimes.
  • Legal considerations: The book could delve into the legal aspects of computer forensics, including the laws and regulations governing digital evidence, as well as the ethical considerations involved in collecting and analyzing digital data.
  • Evidence collection and analysis: The book might provide detailed information on how to properly collect, preserve, and analyze digital evidence, including techniques for recovering deleted or hidden data.
  • Case studies and real-world examples: The book might include examples and case studies of actual computer forensic investigations to illustrate key concepts and techniques.
  • Tools and resources: The book could provide information on the various tools and resources available to computer forensic professionals, including software programs, hardware devices, and online resources.

Similar Products

System Forensics, Investigation, and Response (Information Systems Security & Assurance) (PAPERBACK BOOK ONLY) (Lab Access Code Sold Separately)Fundamentals of Information Systems SecurityCrimeware: Understanding New Attacks and DefensesSecurity Policies and Implementation Issues (Jones & Bartlett Learning Information Systems Security & Assurance)Cybercrime and Digital Forensics: An IntroductionGuide to Computer Forensics and Investigations (with DVD)CompTIA Network+ All-In-One Exam Guide, Sixth Edition (Exam N10-006)Career ManagementNetwork and System SecuritySystem Forensics, Investigation and Response (Jones & Bartlett Learning Information Systems Security & Ass)