Digital Forensics, Investigation, and Response, Fourth Edition

  • 8h 36m
  • Chuck Easttom, PhD, DSc, MEd
  • Jones and Bartlett Learning
  • 2022

Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources.

Features and Benefits

  • Available with new Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills
  • Chapter 8 Windows Forensics, has been expanded to include SRUM, BAM, and DAM registry entries
  • Updates to all chapters include changes to the underlying technology, changes to the law, and newer case studies
  • New chapter regarding memory forensics
  • Chapter 15 “New Trends” introduces a general methodology of smart TV forensics

About the Author

Chuck Easttom, PhD, DSc, MEd - Adjunct Lecturer, Georgetown University, Adjunct Professor, University of Dallas

Dr. Chuck Easttom is the author of 32 books, including several on computer security, forensics, and cryptography. He has also authored scientific papers on digital forensics, cyber warfare, machine learning, cryptography, and applied mathematics. He is an inventor with 22 computer science patents. He holds a Doctor of Science (D.Sc.) in cyber security, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master’s degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE.

He also holds 55 industry certifications including many cyber security and digital forensics certifications. He has both academic and hands on forensics experience. He has served as an expert witness in U.S. court cases since 2004. He is currently an adjunct lecturer for Georgetown University where he teaches cyber security, systems engineer, and cryptography and an adjunct professor for University of Dallas where he teaches a graduate course in digital forensics.

In this Book

  • Introduction to Forensics
  • Overview of Computer Crime
  • Forensic Methods and Labs
  • Collecting, Seizing, and Protecting Evidence
  • Understanding Techniques for Hiding and Scrambling Information
  • Recovering Data
  • Incident Response
  • Windows Forensics
  • Linux Forensics
  • Mac OS Forensics
  • Email Forensics
  • Mobile Forensics
  • Network Forensics
  • Memory Forensics
  • Trends and Future Directions
  • Glossary of Key Terms
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)