Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this comprehensive guide from two seasoned law enforcement professionals. From recognizing high-tech criminal activity and collecting evidence to presenting it in a way that judges and juries can understand, this book covers the range of skills, standards, and step-by-step procedures you’ll need to conduct a criminal investigation in a Windows environment and make your evidence stand up in court.
The book also covers the emerging field of “live forensics,” where investigators examine a system to obtain evidence while it is still running, thus preserving live data that may be lost if the system is shut down.
Steve Bunting is a captain with the University of Delaware Police Department, where he is responsible for computer forensics, video forensics, and investigations involving computers. He has more than thirty years experience in law enforcement, and his background in computer forensics is extensive. He is a Certified Computer Forensics Technician (CCFT) and an EnCase Certified Examiner (EnCE). He was the recipient of the 2002 Guidance Software Certified Examiner Award of Excellence. He has a bachelor’s degree in applied professions/business management from Wilmington College and a computer applications certificate in network environments from the University of Delaware. He has conducted computer forensic examinations for numerous local, state, and federal agencies on a variety of cases, including extortion, homicide, embezzlement, child exploitation, intellectual property theft, and unlawful intrusions into computer systems. He has testified in court on numerous occasions as a computer forensics expert. He has taught computer forensics for Guidance Software, makers of EnCase, and taught as a lead instructor at all course levels. He has been a presenter at several seminars and workshops, is the author of numerous white papers, and is the primary author of the book EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide , which was published by Sybex in early 2006. You can reach him at email@example.com.
Very good book on Window's forensics. I got it for a college class and although dated, it had allot of useful information.Published 13 months ago by Saoi
Don't waste your money.
The opening chapter of this book validates that the author of this book has more personal issues than professional experience. Read more
I have reviewed most 2008r2 books on the topic of logon scripts. I'm talking about Windows Server 2000 script style. Read morePublished on May 21, 2010 by Wojciech Tatina
This is a good book on some of the basics of windows forensics. The product came in when I was told it would. Read morePublished on June 30, 2009 by Khris A. Martinez
It is a tool you should have in your toolbox.
Everything you must know to be the expect.
CPU-Tech-Solutions. Read more
This book is well worth the price. Much information regarding network configuration and network logs examination, which is highly needed in performing investigations in todays... Read morePublished on July 24, 2007 by M. Petersen