Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Digital Investigations: The Forensic Process and Examination of Digital Evidence focuses on the examination phase of a digital investigation. It reviews the technical skills of digital forensics and how to locate and acquire forensic artifacts on Windows systems, emails and file systems. The book also covers critical skills lacking in other works, including how to handle a digital crime scene and the forensic process for computer systems. In addition, it answers what to do and how to handle gathered evidence during investigations. The text includes labs to teach technical skills, such as data recovery, evidence identification, forensic timelines, etc.
Digital forensics is a crucial science. We are currently at the point where we use technology to support our lifestyle. Soon we will enter an age where technology supplements it. An age where our car will send us an email to remind us it has checked our calendar and booked an oil change at a shop a mile from our house. Where we can view a webcam on our phones to see that grandma is ringing the doorbell.
- Provides an overview of the tools and techniques experts in the field of computer crime need in digital forensics
- Includes steps on how to handle a scene, identify/acquire/preserve evidence and disk and data recovery
- Presents the terminology and tools involved in digital investigations, how to conduct examinations, specifically in Windows systems, and in email
Students and Instructors of digital forensics and computer crime. Law Enforcement and Crime Scene First Responders
- Computer Basics for Digital Investigations and First Responders
2. Applying Forensic Science to Digital Investigations
3. Handling the Digital Crime Scene
4. Disk and Data Recovery
5. Forensic Iconalysis
6. Forensic Examination of Windows Systems
7. Forensic Examination of Macintosh and Unix/Linux Systems
8. Forensic Examination of Mobile Devices
9. Forensic Examination of Networks
10. Forensic Examination of Email
11. Indicators of Compromise
12. Investigation of Computer Intrusions
13. Investigation of Child Exploitation
14. Investigation of Cyberstalking
15. Digital Evidence as an Alibi
- No. of pages:
- © Academic Press 2021
- 1st December 2029
- Academic Press
- Paperback ISBN:
Mr. Johnson holds a BS in Political Science (Law and Legal Systems), a BS in Social Science and an MS in Criminology (Cybercrime and Cyber Ethics). He’s currently the Information Security Officer at the University of Wisconsin in Stevens Point. He is also an Associate Lecturer in the Sociology and Computing & New Media Departments, as well as a Professor of Digital Forensics. Mr. Johnson has 15+ years’ experience in Information Assurance and Information Security, is a former private investigator, specializing in cyber-intelligence and digital profiling.
Information Security Officer and Professor, University of Wisconsin – Stevens Point, Stevens Point, WI, USA
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.