Academic book request
Inspection copies are available to lecturers considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with the details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
Please note that outside of the UK, we can only provide eBooks. All requests are subject to our approval, further details regarding T&Cs may be found on our website.
Digital Forensics, Investigation, and ResponseAuthor: Chuck Easttom
Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources.
Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device.
Features and Benefits
- Available with new Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills
- Chapter 8 Windows Forensics, has been expanded to include SRUM, BAM, and DAM registry entries
- Updates to all chapters include changes to the underlying technology, changes to the law, and newer case studies
- New chapter regarding memory forensics
- Chapter 15 “New Trends” introduces a general methodology of smart TV forensics
TABLE OF CONTENTS
- Part One Introduction to Forensics
- Chapter 1 Introduction to Forensics
- Chapter 2 Overview of Computer Crime
- Chapter 3 Forensic Methods and Labs
- Part Two Forensics Tools, Techniques, and Methods
- Chapter 4 Collecting, Seizing, and Protecting Evidence
- Chapter 5 Understanding Techniques for Hiding and Scrambling Information
- Chapter 6 Recovering Data
- Chapter 7 Incident and Intrusion Response
- Part Three Branches of Digital Forensics
- Chapter 8 Windows Forensics
- Chapter 9 Linux Forensics
- Chapter 10 Macintosh Forensics
- Chapter 11 Email Forensics
- Chapter 12 Mobile Forensics
- Chapter 13 Network Forensics
- Chapter 14 Memory Forensic
- Chapter 15 Trends, Future Directions, and Resources