Hardcover: 432 pages
Publisher: Auerbach Publications; 1 edition (March 9, 2007)
Language: English
ISBN-10: 0849305616
ISBN-13: 978-0849305610
Product Dimensions: 6.1 x 0.9 x 9.2 inches
Shipping Weight: 1.6 pounds (View shipping rates and policies)
Average Customer Review: 2.8 out of 5 stars See all reviews (4 customer reviews)
Best Sellers Rank: #1,226,854 in Books (See Top 100 in Books) #425 in Books > Business & Money > Insurance > Risk Management #673 in Books > Computers & Technology > Internet & Social Media > Hacking #938 in Books > Law > Criminal Law > Forensic Science
This book is a great survey of the field of computer forensics.There are notable gaps in actual technical detail, and more information than I was ready to digest on the handling of the data once acquired -- mostly the legal hoop-jumping required to maintain chain-of-custody.If you're a techie looking for a HowTo, keep looking. If you've already got a grasp of the how, but need the fine details of handling, this book is a good reference tome.
This is the worst computer book I have read in a long time. If you already know about what data is, for names of different operating system keep looking. The only part of the this book that is about computer forensics is the part it says go to Devery University to learn the subject. Guess where the author teaches at?
This book was very boring but I had to buy it for class. The text was redundant and out of place. I found it hard to follow the ideas of the author because they didn't flow very well in the book. The author gave some examples that were too general and didn't really help me understand the objectives he was trying to teach. I didn't have any experience in computer forensics when I purchased this book so I did learn quite a bit. Even though it was painful to read, it does have use as a reference book.
"Computer Forensics: Evidence Collection And Management" by Robert C. Newman (Instructor of Information Systems in the College of Information Technology at Georgia Southern University) provides a coherent, systematic, and comprehensive analytical study of cybercrime, E-commerce, and Internet activities that could be used to exploit the Internet, the computers, and the various electronic devices employed by individuals, by government agencies, and by corporations. "Computer Forensics" addresses the many vulnerabilities and threats that are inherent to our computer age and presents the techniques and processes utilized by security personnel, investigators and forensic examiners to successfully identify, retrieve, and protect computer data as forensic evidence for litigation and prosecution. the first part of "Computer Forensics" is dedicated to exploring various crimes, laws, policies, forensic tools, and the information required to understand the underlying concepts of computer forensic investigation. The second part of "Computer Forensics" presents basic information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Of special note are the specific chapters concerning investigations involving computer systems, e-mail, and wireless devices. Presenting more than 200 key terms (with definitions supplied in the Glossary), more than 100 review questions and answers to solidify comprehension, offering optional exercises and cases emphasizing the book's content, two sets of forms with respect to forensic investigation and the procedures used in computer forensic laboratories, and a selected bibliography of special relevance for forensic professionals, "Computer Forensics" is the ideal textbook for college level computer science and information technology courses, as well as non-special general readers with an interest in the subject.
Computer Forensics: Evidence Collection and Management The Basics of Digital Forensics, Second Edition: The Primer for Getting Started in Digital Forensics Computer Investigation (Forensics: the Science of Crime-Solving) Johns Hopkins Nursing Evidence Based Practice Model and Guidelines (Second Edition) (Dearholt, John Hopkins Nursing Evidence-Based Practice Model and Guidelines (previous) Evidence-Based Practice For Nurses: Appraisal and Application of Research (Schmidt, Evidence Based Practice for Nurses) The New Evidence That Demands A Verdict: Evidence I & II Fully Updated in One Volume To Answer The Questions Challenging Christians in the 21st Century. Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science (Machine Language) FORENSICS: UNCOVER THE SCIENCE AND TECHNOLOGY OF CRIME SCENE INVESTIGATION (Inquire and Investigate) Forensics: What Bugs, Burns, Prints, DNA, and More Tell Us About Crime Food Forensics: The Hidden Toxins Lurking in Your Food and How You Can Avoid Them for Lifelong Health Forensics Duo Series Volume 4: Duo Practice and Competition Thirty-five 8-10 Minute Original Dramatic Plays for Two Females CCFP Certified Cyber Forensics Professional All-in-One Exam Guide Forest Forensics: A Field Guide to Reading the Forested Landscape Sorting the Beef from the Bull: The Science of Food Fraud Forensics Criminal Psychology & Personality Profiling (Solving Crimes With Science: Forensics) Project Management: 26 Game-Changing Project Management Tools (Project Management, PMP, Project Management Body of Knowledge) Agile Project Management: Box Set - Agile Project Management QuickStart Guide & Agile Project Management Mastery (Agile Project Management, Agile Software Development, Agile Development, Scrum) Agile Project Management: An Inclusive Walkthrough of Agile Project Management (Agile Project Management, Agile Software Developement, Scrum, Project Management) Identifying Perinatal Depression and Anxiety: Evidence-based Practice in Screening, Psychosocial Assessment and Management