Read more
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Also learn how to collect evidence, document the scene, and how deleted data is recovered.
Learn all about what Digital Forensics entails
Build a toolkit and prepare an investigative plan
Understand the common artifacts to look for during an exam
List of contents
Chapter 1. Introduction Chapter 2. Key Technical Concepts Chapter 3. Labs and Tools Chapter 4. Collecting Evidence Chapter 5. Windows System Artifacts Chapter 6. Anti-Forensics Chapter 7. Legal Chapter 8. Internet and Email Chapter 9. Network Forensics Chapter 10. Mobile Device Forensics Chapter 11. Looking Ahead: Challenges and Concerns
About the author
John Sammons is an Assistant Professor at Marshall University in Huntington, West Virginia. John teaches digital forensics, electronic discovery, information security and technology in the Department of Integrated Science and Technology. He's also adjunct faculty with the Marshall University graduate forensic science program. He is also the founder and Director of the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement and information security practitioners in the private sector. John, a former police officer, is also an Investigator with the Cabell County Prosecuting Attorney's Office and a member of the FBI's West Virginia Cybercrime Task Force. He is an Associate Member of the American Academy of Forensic Sciences, the High Technology Crime Investigation Association, the Southern Criminal Justice Association and Infragard.
Report
"This book is an excellent introduction and overview of the field of Configuration Systems. It covers the most important developments in the field."-- HPCMagazine.com, August 2014
"The book is quite easy to read - the author uses colloquial language and the text flows more like long magazine articles rather than a text book. A nice addition is computer forensic case studies that are peppered throughout the book." -- The Journal of Digital Forensics, Security and Law, Vol. 9, No. 1, 2014