Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
On the other hand, though Vacca gives good general advice (don't lose volatile information by shutting a compromised machine down midattack; do be prepared to translate memory dumps into jury-readable form), he sometimes meanders into generalizations and irrelevancies. The fact that terrorists distribute their plans via public Web sites is certainly scary, but hardly helpful to someone wanting to prosecute the guy who vandalized the corporate Web site. Similarly interesting, but practically irrelevant to most of us, are discussions of high-energy radio frequency (HERF) and electromagnetic pulse (EMP) weapons that can knock out information systems from a distance. More focus on evidence collection in organizational computing environments would make this book useful, rather than just generally informative. --David Wall
Topics covered: How to gather evidence of a hack attack after the fact, and a lot of general-interest information on the state of crime and law enforcement in computer technology. Coverage is almost all general in nature, dealing with how to formulate a strategy and deal with events without getting into details of any operating system or computing environment.
Horrible book. Practically no hands on examples whatsoever, just a book of blah blah blah. If you enjoy hearing about forensics, but not learning anything, then enjoy!Published 16 months ago by Spongebobby Squarepants Living in a Pineapple
I have used this book as a text before and wanted a copy for myself. The book was sent to me in a few days and with hastPublished on December 2, 2012 by Douglas L. Miller
This is an excellent book. I will tell you that it is not for beginners. This book is like a field book telling you the ins and outs of the legal side of computer forensics. Read morePublished on December 13, 2009 by D. Eckart
This edition of the book addresses the most current concerns/issues that every computer professional/layman should be aware of. Read morePublished on October 10, 2005 by Zdenek
Computer Forensics is very appropriate considering a number of data storage facilities that
have been recently hacked into, resulting in theft of customer data. Read more
With jails overcrowded this book certainly won't help.
Great reference. Truly the "CSI" handbook of computer security reference. Read more
This book is quite an applicable book in today's world. Inappropriate use of the computer technology in identity theft, terrorism, etc. is becoming a growing problem. Read morePublished on September 2, 2005 by RB
If you're interested in cyber crime and how cyber criminals are caught, "Computer Forensics" by John Vacca is the book for you. Read morePublished on September 2, 2005 by S. Kowanick