Terrorist attacks are no longer relegated to airports and federal buildings. Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book/CD package provides a complete overview of computer forensics from its definition to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminal. The book focuses on "solving the crime" rather than information security.
KEY FEATURES
- Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods and services
- Discusses data seizure and analysis, preservation of computer evidence, reconstruction of events and information warfare
- Case studies and vignettes of actual computer crimes are used
- CD includes demos of the latest computer forensics and auditing software
Author Biography: John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.