Programming Books C Java PHP Python Learn more Browse Programming Books

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series) [Paperback]

John R. Vacca
4.4 out of 5 stars  See all reviews (43 customer reviews)


Available from these sellers.


Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
Paperback --  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now
There is a newer edition of this item:
Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Charles River Media Networking/Security) Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Charles River Media Networking/Security) 4.4 out of 5 stars (43)
Out of Print--Limited Availability

Book Description

June 15, 2002 1584500182 978-1584500186 1st
Terrorist attacks are no longer relegated to airports and federal buildings. Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book/CD package provides a complete overview of computer forensics from its definition to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminal. The book focuses on "solving the crime" rather than information security.

KEY FEATURES

* Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks

* Case studies and vignettes of actual computer crimes

* Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation Of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tacking; The Individual Exposed; Case Studies and Vignettes

* CD includes tools, presentations, and demos of the latest computer forensics software, including partition images from The Forensic Challenge

On the CD-ROM:

The following forensic tools, demos, and presentations are included on the accompanying CD-ROM.

The Forensics Challenge Partition Images
- The HoneyNet Project
FW-1 Specific Network Intrusion Detector
- Lance Spitzner
RecoverNT v3.5(demo)
Recover98 v3.5 (demo)
FILERECOVERY for Windows v2.1(demo)
PHOTORECOVERY for Digital Media 1.5(demo)
- LC Technology International, Inc.
The Coroner's Toolkit (TCT)
- Dan Farmer and Wietse Venema
Free Hex Editor v1.1
- Raihan Kibria
WinHex 10.45(demo)
- X-Ways Software Technology AG
TCPurify 0.9.6
- Ethan Blanton
Protect2000 Security Suite (product presentation)
- Computer Security Products Inc.
Mazu Enforcer (product presentation)
- Mazu Networks



Editorial Reviews

Amazon.com Review

The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer Forensics: Computer Crime Scene Investigation explains how to gather evidence of computer crimes in such a way that it will be more likely to lead to a conviction in a criminal court. It's an interesting legal area--after all, it's almost always you, and not any law enforcement agency doing the surveillance and evidence-gathering on your computer systems--and John Vacca has done a fair bit of research. This book will probably expand your thinking on the subject of information security.

On the other hand, though Vacca gives good general advice (don't lose volatile information by shutting a compromised machine down midattack; do be prepared to translate memory dumps into jury-readable form), he sometimes meanders into generalizations and irrelevancies. The fact that terrorists distribute their plans via public Web sites is certainly scary, but hardly helpful to someone wanting to prosecute the guy who vandalized the corporate Web site. Similarly interesting, but practically irrelevant to most of us, are discussions of high-energy radio frequency (HERF) and electromagnetic pulse (EMP) weapons that can knock out information systems from a distance. More focus on evidence collection in organizational computing environments would make this book useful, rather than just generally informative. --David Wall

Topics covered: How to gather evidence of a hack attack after the fact, and a lot of general-interest information on the state of crime and law enforcement in computer technology. Coverage is almost all general in nature, dealing with how to formulate a strategy and deal with events without getting into details of any operating system or computing environment.

From the Publisher

KEY FEATURES - Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods and services - Discusses data seizure and analysis, preservation of computer evidence, reconstruction of events and information warfare - Case studies and vignettes of actual computer crimes are used - CD includes demos of the latest computer forensics and auditing software

Product Details

  • Series: Networking Series
  • Paperback: 600 pages
  • Publisher: Charles River Media; 1st edition (June 15, 2002)
  • Language: English
  • ISBN-10: 1584500182
  • ISBN-13: 978-1584500186
  • Product Dimensions: 9.2 x 7.4 x 1.4 inches
  • Shipping Weight: 2.6 pounds
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (43 customer reviews)
  • Amazon Best Sellers Rank: #1,711,236 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews
15 of 15 people found the following review helpful
2.0 out of 5 stars Huge Disappointment: Little-to-No Technical Content July 17, 2002
Format:Paperback
The first 250 or so pages provide a decent (at best) high-level description of Computer Forensics, but the next 300 pages have little to do with computer crime investigations. It seems as if this book should really be two books: the first book would provide a good overview of computer forensics for those who are not very technical, and the second book (larger book) would be on Information Warfare. If you are looking for a decent book on forensic computing, with a lot of technical meat, this is NOT your book.
Comment | 
Was this review helpful to you?
18 of 19 people found the following review helpful
1.0 out of 5 stars Disappointed by the content July 17, 2002
Format:Paperback
When I started this book I figured it would be on forensic analysis, data recovery and court presentation. The subject matter, however, tends to be more in tune with scare tactics, information warfare and a review of the author's previous work. The cd of "forensic software" doesn't match the content either. Several of the packages on the cd are interesting, useful and even well known, however the book doesn't go into detail regarding their use. In my opinion, I would recommend the book by Heiser and Kruse as a better choice for those looking for a complete book on the subject of computer forensics.
Comment | 
Was this review helpful to you?
8 of 8 people found the following review helpful
3.0 out of 5 stars Okay but I was disappointed January 12, 2007
Format:Paperback
I was real excited when I saw this book that looked like the bible of computer forensics and it came with a DVD. The cost of 50 dollars made it expensive but with DVD that I hope would have video that I can watch.

THe book is okay in giving a general idea of computer forensics. It was not very specific in what to do. It has an interactive part in which it give you general answer too not very thorough.

Then, it goes on a tangent about warfare and cyber terrorism. It leaves the forensics behind. And the book goes over 700 pages.

The DVd is intro to some fornesics software, I was hoping it had video

to show people like me that are visual and can learn more this way.

So, the book is okay but I would check others that are more specific and give more thorough details about computer forensics.
Comment | 
Was this review helpful to you?
5 of 5 people found the following review helpful
Format:Paperback
Vacca appears to have edited rather than written this, and none too well at that. Some chapters use British spelling and some US, some talk of Pounds Sterling and others Dollars. (For each of the five star reviews, examine that writer's other reviews see if you detect a pattern emerging.)

Having said that, the book does present a fairly decent overview of computer forensics for those who want general information about it, and had it been advertised as such I'd have graded it higher. It offers little or nothing, however, to the practitioner or serious student.
Comment | 
Was this review helpful to you?
8 of 10 people found the following review helpful
2.0 out of 5 stars ???? June 22, 2002
By A Customer
Format:Paperback
this is NOT a hands on tech book. it has a lot of procedure that is important for insuring the intergity of information that is gathered but i was expecting the "meat" of the subject.
Comment | 
Was this review helpful to you?
3 of 3 people found the following review helpful
5.0 out of 5 stars Informed Forensics Investigation August 31, 2005
By jcrocks
Format:Paperback
This second edition gives the reader a comprehensive overview of computer forensics from information security issues to data recovery techniques. It helps you to understand auditing methods from terrorist cyber-attacks. The second addition includes Evidence Identification and Checklist forms, hands-on projects, exercises, and case studies for each chapter. The CD included with the book has tools, presentations, and demos of the latest computer forensics software. If you look through the selected topics you will find the way to protect the software that you use the most in your transactions. This includes: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verification; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms. The cost of this book is a small price to pay for this current knowledge and protection to your data and information.
Comment | 
Was this review helpful to you?
12 of 16 people found the following review helpful
1.0 out of 5 stars Another "How to..." disappointment. July 2, 2002
Format:Paperback
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM)by John R. Vacca.
This book is a real disappointment. It is pedantic, has low technical content, 90% palaver, and lots of anecdotal stories of little practical use. Amazon should be ashamed of recommending it.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
2.0 out of 5 stars Deceptive title, very little forensic information October 25, 2010
Format:Paperback
My first question is, does the author know what the title of his own book is? I ask this because I was very disappointed with this work since the title simply does not match the content. The initial chapters do capture some essence of forensic investigation, but there is very little technical detail. It is mostly a "how to" guide for investigative teams in that it offers advice as how to organize, plan, and manage investigations--without getting into the specifics of how to do so. This book may be best for those with no understanding of the subject--like people who know almost nothing about computers.

A third of the way into the book, the author starts talking about cyberwarfare, information warfare, and attacks by hackers and terrorists without making any connection whatsoever to computer forensics and crime scene investigation. The information given is so broad with such little specific, useful examples it appears to be an effort to cover everything which ends up covering nothing.

Also, I did not like how the author pontificated about terrorism/counterterrorism policy issues where he is obviously out of his league as when issuing such sophmoric statements that terroists are increasingly focused on urban areas because cities are important. I thought it was because the world is increasingly urbanized with the majority of the global population-which is the terrorists' audience-now living in cities. Guess I was wrong. Finally, the author makes political statements in this work about U.S. political parties and representatives making certain decisions about missile defense strategy. Again, he is clearly out of his league and these examples only underline how far he has strayed off the title of the book--computer forensics and crime scene investigations.
Read more ›
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
4.0 out of 5 stars Book
I have used this book as a text before and wanted a copy for myself. The book was sent to me in a few days and with hast
Published 19 months ago by Douglas L. Miller
5.0 out of 5 stars In the field of computer forensics
This is an excellent book. I will tell you that it is not for beginners. This book is like a field book telling you the ins and outs of the legal side of computer forensics. Read more
Published on December 13, 2009 by D. Eckart
5.0 out of 5 stars New/updated info is spot on!
This edition of the book addresses the most current concerns/issues that every computer professional/layman should be aware of. Read more
Published on October 10, 2005 by Zdenek
5.0 out of 5 stars Computer Forensics: Computer Crime Scene Investigation (With CD-ROM)...
Computer Forensics is very appropriate considering a number of data storage facilities that

have been recently hacked into, resulting in theft of customer data. Read more
Published on October 8, 2005 by Pramod Pandya
5.0 out of 5 stars The "CSI" of computer security
With jails overcrowded this book certainly won't help.

Great reference. Truly the "CSI" handbook of computer security reference. Read more
Published on October 3, 2005 by William D. Watson
5.0 out of 5 stars General Comments
This book is quite an applicable book in today's world. Inappropriate use of the computer technology in identity theft, terrorism, etc. is becoming a growing problem. Read more
Published on September 2, 2005 by RB
5.0 out of 5 stars Great Book
If you're interested in cyber crime and how cyber criminals are caught, "Computer Forensics" by John Vacca is the book for you. Read more
Published on September 2, 2005 by S. Kowanick
5.0 out of 5 stars Terrific book
This book extensively covered the complete field of computer-based crime. The author is well versed in computer systems and security. Read more
Published on August 31, 2005 by D. Lee
5.0 out of 5 stars Comprehensive Must-Read for all Investigators
As a professional compute consultant, it sometimes seems like everyday I have to pick up a book and learn something new. Read more
Published on August 25, 2005 by Scorellis
Search Customer Reviews
Search these reviews only




What Other Items Do Customers Buy After Viewing This Item?


Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category