Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Chapter 1: Computer Forensics Fundamentals
- Provide Expert Consultation and Expert Witness Services Computers
Chapter 2: Types of Computer Forensics Technology
- Mirror Image Backup Software
- ANADISK DISKETTE ANALYSIS TOOL
- Text Search Plus
- Intelligent Forensic Filter
Chapter 3: Types of Vendor and Computer Forensics Services
- The Difficulties Of High-Speed Intrusion Detection
- Computer Forensic Incident Response Procedures (CFIRP)
- Evidence Capture
- Computer Forensics Certified
Chapter 6: Duplication and Preservation of Digital Evidence
- Emergency Guidelines
Chapter 7: Computer Image Verification and Authentication
- Digital Ids And Authentication Technology
Chapter 12: Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
- Doomsday Software
- Israel’s Cyberwar Seminar
Chapter 13: The Information Warfare Arsenal and Tactics of the Military
- Renegotiating The Human–Machine Interface
- Agent-Based Systems
- Cyberoffense Mired In Cold War
- Military Tests Digital Forces
Chapter 14: The Information Warfare Arsenal and Tactics of Terrorists and Rogues
- Bin Laden Uses Web To Plan
- Stopping Nuclear Blackmail
- Chemical And Biological Terrorism
- Hacker-Controlled Tanks, Planes, And Warships
- The Dark World Of The Cyber Underground
- Bioterrorists On The Green
- Espionage By Keystroke?
- Cyberspace Incidents On The Rise In China
- China Grabs U.S. Technology To Modernize Its Military
- Putting Terror Inc. On Trial
- Infidels
- Has Cuba Joined The Iw Games?
Chapter 15: The Information Warfare Arsenal and Tactics of Private Companies
- Five Easy Steps To Planning And Launching A Cyberattack
- Data Protection Measure Tips
- Privacy Agreements
Chapter 16: Information Warfare: Arsenal of the Future
- Will The Real La Femme Nikita Stand Up
- Helping Hackers Take Control Of Military Satellites
- Privacy Concerns Remain
- The Privacy Foundation
Chapter 18: Civilian Casualties—The Victims and Refugees of Information Warfare
- Electric Power System Vulnerabilities
- Widespread Break-In By Crime Groups Cause Damage
- Hacker Insurance
- Cyberattack Protection Plan
- Checking Fingerprints
- Patient Files Copied By Hacker
- New Medical Privacy Rules
Chapter 19: Advanced Computer Forensics
- Computer-Free Encryption
- A Menu Of Symmetric Encryption Algorithms
- Human And Hardware Frailties
- Hack Yourself Before Somebody Else Does
- Future Threat: Advanced Malicious Code In Software
- The Costs Of Tracking A Hacker
- Insider Accounts