Building a Digital Forensic Laboratory - 1st Edition - ISBN: 9781856175104, 9780080949536

Building a Digital Forensic Laboratory

1st Edition

Establishing and Managing a Successful Facility

Authors: Andrew Jones Craig Valli
Paperback ISBN: 9781856175104
eBook ISBN: 9780080949536
Imprint: Syngress
Published Date: 2nd October 2008
Page Count: 312
Tax/VAT will be calculated at check-out
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory and its subsequent support to successfully conducting computer-related crime investigations.

Key Features

  • Provides guidance on creating and managing a computer forensics lab
  • Covers the regulatory and legislative environment in the US and Europe
  • Meets the needs of IT professionals and law enforcement as well as consultants


Corporate security directors, law enforcement high-technology crime investigators, other security professionals and private investigators. The secondary audiences will be IT professionals and academics.

Table of Contents

SECTION I: Computer Related Crime Investigations and Computer Forensics Management Support.

This section provides a background to computer crime and addresses the Computer Forensics management issues related to Computer Forensic Incidents and Crime Investigations. It looks at how investigations are carried out, what needs to be considered in the planning of an investigation and the conduct of the investigation including the collection and storage of evidence. The section finishes with a number of case studies to highlight how things can go well if they are done properly and how they can go wrong if they are not.

Chapter 1. A Short History of Computer-Related Crimes and the Developing Need for Computer Forensics. This chapter will provide an overview of computer-related crimes from the less sophisticated and localized dial-up computer crimes to today's sophisticated, global, network attacks; as well as the history of the development of the computer forensics profession and increasingly formal computer forensics laboratories.

Chapter 2. An Introduction to Computer Forensics. This chapter provides an overview of the important concepts associated with "computer forensics." It describes the potential sources of evidence available in the typical microcomputer, how to conduct a search for evidence, and a method of conducting a search in a systematic and effective manner.

Chapter 3. Types of Forensic Investigation. This chapter will include the reasons for carrying out the investigation and the type of investigation that is being undertaken, for example single computer, network or mobile devices.

Chapter 4. Responding to Crimes requiring Computer Forensic Investigation. This chapter will talk about what actions are required, the management considerations and just as importantly, what should not be done when responding to a high tech c


No. of pages:
© Syngress 2009
eBook ISBN:
Paperback ISBN:

About the Author

Andrew Jones

After 25 years service with the British Army’s Intelligence Corps, Andy Jones became a business manager and a researcher and analyst in the area of Information Warfare and computer crime at a defence research establishment. In Sept 2002, on completion of a paper on a method for the metrication of the threats to information systems, he left the defence environment to take up a post as a principal lecturer at the University of Glamorgan in the subjects of Network Security and Computer Crime and as a researcher on the Threats to Information Systems and Computer Forensics. At the university he developed and managed a well equipped Computer Forensics Laboratory and took the lead on a large number of computer investigations and data recovery tasks. He holds a Ph.D. in the area of threats to information systems. In January 2005 he joined the Security Research Centre at BT where he became a Chief Researcher and the head of information. Andy now holds a post as a visiting Professor at Edith Cowan University in Perth, Australia and he is currently the Programme Chair for the M.Sc. in Information Security at Khalifa University in Sharjah, UAE.

Affiliations and Expertise

is the Program Chair for the M.Sc. in Information Security at Khalifa University in Sharjah, UAE.

Craig Valli


"This book is designed to get at the heart of the matter." -- Dave Kleiman, computer forensics expert and security software developer