Forensic Computing (Practitioner Series)
Author | : | |
Rating | : | 4.37 (640 Votes) |
Asin | : | 1846283973 |
Format Type | : | paperback |
Number of Pages | : | 470 Pages |
Publish Date | : | 2015-04-13 |
Language | : | English |
DESCRIPTION:
… It is filled with good practical advice and is especially good on interpreting partition tables. … It is now listed as the standard text around which all the Forensic Computing courses at Cranfield and some other universities are based. … Truly the forensic computing expert is living in interesting times." (Alikelman, June, 2009). … All in all this is a useful … guide to the discipline. From the reviews of the second edition:"This book was the product of an ‘arms race’
Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system’s internal security safeguards, and full search and seizure protocols for experts and police officers.. Equally important, they demonstrate how to insure that computer evidence is admissible in court. In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals
Sammes was a serving British Army Officer with the rank of Colonel, late of the Royal Corps of Signals. J. His present appointment is Professor of Computing Science, in the Faculty of Military Science, Technology and Management at the Defense Academy, Cranfield University, Shrivenham.His formal qualifications include a Bachelor of Science in Electrical E
"A beginners guide" according to Simon Wellborne. If you are new to the Forensic game then this book might make good reading. A large portion of the book is on disk and data structure & geometry. This makes for interesting reading if you have not covered this before, but if you are an investigator, this will be 'old' and somewhat irrelevant news.Chapters include information on;* PDA/Electronic Organisers,* Search and seizure of PC's* A little on Network and encryption (informational reading only).Overall, n. PC User said In-depth look at NTFS. This book covers NTFS at the byte level. It has tables and explanations that extremely useful for a course I was taking. I purchased most of the computer forensic books available but all the other books contained mere summaries of NTFS. This volume covers the nuts and bolts. Excellent book, need more like this.