Hier klicken Strandspielzeug reduziertemalbuecher Cloud Drive Photos Microsoft Surface Learn More HI_PROJECT Hier klicken Fire Shop Kindle PrimeMusic Summer Sale 16 Fashion Sale
In weniger als einer Minute können Sie mit dem Lesen von Digital Evidence and Computer Crime auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen oder mit einer unserer kostenlosen Kindle Lese-Apps sofort zu lesen anfangen.

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Keine Abbildung vorhanden

Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet [Kindle Edition]

Eoghan Casey

Kindle-Preis: EUR 42,85 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Kostenlose Kindle-Leseanwendung Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Weitere Ausgaben

Preis Neu ab Gebraucht ab
Kindle Edition EUR 42,85  
Gebundene Ausgabe EUR 47,95  
Kindle AusLese
Jeden Monat vier außergewöhnliche Neuerscheinungen für je nur 2,49 EUR - empfohlen vom Amazon-Team. Erfahren Sie mehr über das Programm und melden Sie sich beim Kindle AusLese Newsletter an.



Praise for the first and second editions:

"Author Eoghan Casey does a superb job of applying forensic science to computers." -- Ben Rothke, SecurityManagement.com

."..Casey does a great job making difficult concepts easy to understand."

Praise for the first and second editions:
"Author Eoghan Casey does a superb job of applying forensic science to computers." -- Ben Rothke, SecurityManagement.com
..".Casey does a great job making difficult concepts easy to understand."


Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The textbook teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Additionally, this third edition includes updated chapters dedicated to networked Windows, Unix, and Macintosh computers, and Personal Digital Assistants.

Ancillary materials include an Instructor's Manual and PowerPoint slides.

  • Named The 2011 Best Digital Forensics Book by InfoSec Reviews
  • Provides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence
  • Features coverage of the abuse of computer networks and privacy and security issues on computer networks


  • Format: Kindle Edition
  • Dateigröße: 7817 KB
  • Seitenzahl der Print-Ausgabe: 840 Seiten
  • ISBN-Quelle für Seitenzahl: 0123742684
  • Verlag: Academic Press; Auflage: 3 (12. April 2011)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B007N15E6E
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Aktiviert
  • Verbesserter Schriftsatz: Nicht aktiviert
  • Amazon Bestseller-Rang: #534.824 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?


Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.3 von 5 Sternen  24 Rezensionen
5 von 6 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen The definitive reference on digital forensics 22. September 2011
Von Ben Rothke - Veröffentlicht auf Amazon.com
Format:Gebundene Ausgabe
When it comes to a physical crime scene and the resulting forensics, investigators can ascertain that a crime took place and gather the necessary evidence. When it comes to digital crime, the evidence is often at the byte level, deep in the magnetics of digital media, initially invisible from the human eye. That is just one of the challenges of digital forensics, where it is easy to destroy crucial evidence, and often difficult to preserve correctly.

For those looking for an authoritative guide, Digital Evidence and Computer Crime is an invaluable book that can be used to ensure that any digital investigation is done in a formal manner, that can ultimately be used to determine what happened, and if needed, used as evidence in court.

Written by Eoghan Casey, a leader in the field of digital forensics, in collaboration with 10 other experts, the book's 24 chapters and nearly 800 pages provide an all-encompassing reference. Every relevant topic in digital forensics is dealt with in this extraordinary book. Its breadth makes it relevant to an extremely large reading audience: system and security administrators, incident responders, forensic analysts, law enforcement, lawyers and more.

In the introduction, Casey writes that one of the challenges of digital forensics is that the fundamental aspects of the field are still in development. Be it the terminology, tools, definitions, standards, ethics and more, there is a lot of debate amongst professionals about these areas. One of the book's goals is to assist the reader in tackling these areas and to advance the field. To that end, it achieves its goals and more.

Chapter 1 is appropriately titled Foundation of Digital Forensics, and provides a fantastic overview and introduction to the topic. Two of the superlative features in the book are the hundreds of case examples and practitioners' tips. The book magnificently integrates the theoretical aspects of forensics with real-world examples to make it an extremely decipherable guide.

Casey notes that one of the most important advances in the history of digital forensics took place in 2008 when the American Academy of Forensic Sciences created a new section devoted to digital and multimedia sciences. That development advanced digital forensics as a scientific discipline and provided a common ground for the varied members of the forensic science community to share knowledge and address current challenges.

In chapter 3 - Digital Evidence in the Courtroom - Casey notes that the most common mistake that prevents digital evidence from being admitted in court is that it is obtained without authorization. Generally, a warrant is required to search and seize evidence. This and other chapters go into detail on how to ensure that evidence gathered is ultimately usable in court.

Chapter 6 - Conducting Digital Investigations - is one of the best chapters in the book. Much of this chapter details how to apply the scientific method to digital investigations. The chapter is especially rich with tips and examples, which are crucial, for if an investigation is not conducted in a formal and consistent manner, a defense attorney will attempt to get the evidence dismissed.

Chapter 6 and other chapters reference the Association of Chief Police Officer's Good Practice Guide for Computer-Based Electronic Evidence as one of the most mature and practical documents to use when handling digital crime scenes. The focus of the guide is to help digital investigators handle the most common forms of digital evidence, including desktops, laptops and mobile devices.

The Good Practice Guide is important in that digital evidence comes in many forms, including audit trails, application, badge reader and ISP and IDS logs, biometric data, application metadata, and much more. The investigator needs to understand how all of these work and interoperate to ensure that they are collecting and interpreting the evidence correctly.

Chapter 9 - Modus Operandi - by Brent Turvey is a fascinating overview of how and why criminals commit crimes. He writes that while technologies and tools change, the underlying psychological needs and motives of the offenders and their associated criminal behavior has not changed through the ages.

Chapter 10 - Violent Crime and Digital Evidence - is another extremely fascinating and insightful chapter. Casey writes that whatever the circumstances of a violent crime, information is key to determining and thereby understanding the victim-offender relationship, and to developing an ongoing investigative strategy. Any details gleaned from digital evidence can be important, and digital investigators must develop the ability to prioritize what can be overwhelming amounts of evidence.

Chapter 13 - Forensic Preservation of Volatile Data - deals with the age-old forensic issue: to shut down or not to shut down? It provides a highly detailed sample volatile data preservation process for an investigator to follow to preserve volatile data from a system. There is also a fascinating section on the parallels between arson and digital intrusion investigations.

Part 4 of the book is Computers, in which the authors note that although digital investigators can use sophisticated software to recover deleted files and perform advanced analysis of computer hard drives, it is important for them to understand what is happening behind the scenes. A lack of understanding of how computers function and the processes that sophisticated tools have automated make it more difficult for digital investigators to explain their findings in court and can lead to incorrect interpretations of digital evidence.

Chapter 17 - File Systems - has an interesting section on dates and times. Given the importance of dates and times when investigating computer-related crimes, investigators need an understanding of how these values are stored and converted. The chapter has a table of the date-time stamp behavior on both FAT and NTFS file systems. Time stamps are not a trivial issue, as there are many different actions involved (file moved, deletion, copy, etc.) that can affect the date-time stamp in very different ways.

A better title for Digital Evidence and Computer Crime might be the Comprehensive Guide to Everything You Need to Know About Digital Forensics. One is hard pressed to find another book overflowing with so many valuable details and real-world examples.

The book is also relevant for those who are new to the field, as it provides a significant amount of introductory material that delivers a broad overview to the core areas of digital forensics.

The book progresses to more advanced and cutting-edge topics, including sections on various operating systems, from Windows and Unix to Macintosh.

This is the third edition of the book and completely upda#ted and reedited. When it comes to digital forensics, this is the reference guide that all books on the topic will be measured against.

With a list price of $70.00, this book is an incredible bargain given the depth and breadth of topics discussed, with each chapter written by an expert in the field. For those truly serious about digital forensics, Digital Evidence and Computer Crime is an equally serious book.
4 von 5 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Not a technical book... 11. September 2012
Von D. Engel - Veröffentlicht auf Amazon.com
Format:Gebundene Ausgabe|Verifizierter Kauf
This book really is focused on legal aspects of computer crime and does not give a lot of detail about how to actually do any type of digital forensics. Great book for understanding some of the history and regulations on computer crime and would recommend for that reason. But if you want to know how to perform any type of digital forensics, get another book.
5.0 von 5 Sternen Chock full of information regarding the ins and outs of best practices in the digital forensics field 14. Mai 2016
Von R. Eye - Veröffentlicht auf Amazon.com
Format:Gebundene Ausgabe|Verifizierter Kauf
Required for a graduate level digital forensics course. I had taken another one before in the Information Assurance major and that class used the Bill Nelson textbook. While Nelson's book delivered more lab exercises for actually harvesting digital data, Casey's book focuses more on the elements inherent in the field of digital forensics.

Chain of custody and legal procedure are critical to success if digital "evidence" is to be accepted in court. The TV shows where the detective looks at a suspect's cell phone and finds a clue immediately is not proper procedure. Accessing a suspect's computer as shown on TV also does not happen since a bit by bit forensic copy must be made first and all operations occur using the copy thereby preserving the original.

There have been strides made in laws regarding digital evidence, however, judges deciding cases involving digital evidence also need to be equipped to comprehend the significance of data on digital devices and how it all works. One flaming example of a judge out of her depth is Judge Lucy Koh during the Samsung tablet v. Apple iPad case. While holding up the two tablets, Koh asked Samsung attorneys to identify which table was Samsung. The patent infringement lawsuit had little to do with the exterior hard case of the tablets and everything to do with its operating system and how data was processed. Casey makes it clear that digital forensics is more about the appropriate processing & handling of digital device evidence, according to venue, and less about whether there is a treasure trove of data clues staring police detectives/federal agents in the face like tempting fruit on a forbidden tree. He also presents the tricky navigating that needs to occur since laws regarding digital device evidence processing & use in court vary widely across the globe.

I like Casey's use of language. I like that he seldom uses "for example" and substitutes "for instance." I like the in-depth and meticulous material. It is the hallmark of a person who knows so much and wants to impart as much of it as possible. Thank you Eoghan Casey for sharing your wealth of knowledge with the community of potential digital forensic investigators.
3.0 von 5 Sternen Wordy 24. Mai 2014
Von JAYNESS the Great - Veröffentlicht auf Amazon.com
Format:Gebundene Ausgabe|Verifizierter Kauf
Did Casey get paid by the page?!? It's obvious that Casey knows his stuff, but this book is way too long for what it offers.

It is repetitive from chapter to chapter. This may be good for those people who only learning through repetition, but it's wasted effort for anyone else.

There is an entire chapter on European cybercrime law, but the only relevant national legislation reviewed is from England, Ireland, and the Netherlands. This is probably because those are the countries he could get an expert from, but again, it's a waste of space. As a reader, if you need to cover specific national legislation, then you'll need more than this chapter, if you don't then again, this chapter is a waste. 100 pages to basically say, "Europe is different than the US". Wow, thanks, I would've never guessed.

This book is not specific enough (no technical details or procedures within) for more than an overview of digital forensic principles, but yet it's too long to be a good overview for people just getting started.

3 stars, because other than the length, there is nothing particularly wrong with the content, but yet, I can't recommend it to anyone. I can't see a reason to need this book except as mandatory reading for a class.
2.0 von 5 Sternen Confusing words. 11. September 2015
Von Amazon Customer - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
This is roughly the format of this book:
Simple concepts explained in excruciating detail that can rarely be applied.
Simple case studies that almost have something to do with the concepts but, on the whole, distract from the concepts.
Amalgams of concepts and case studies that leave you wondering what the purpose is of all these things you're reading.
If you're looking into getting into digital forensics I can't say this is a good way to start.
Though, to be fair, a few of my classmates seemed to love it.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Ähnliche Artikel finden