Warehouse Stock Clearance Sale

Grab a bargain today!


Digital Forensics Processing and Procedures
By

Rating

Product Description
Product Details

Promotional Information

A comprehensive handbook that covers the complete lifecycle of digital evidence.

Table of Contents

Chapter 1. Introduction

Chapter 2. Forensic Laboratory Accommodation

Chapter 3. Setting up a Laboratory

Chapter 4. IT Infrastructure

Chapter 5. Incident Response

Chapter 6. Working in the Laboratory

Chapter 7. Evidence Presentation

Chapter 8. Secure Working Practices

Chapter 9. Ensuring Continuity of Operations

Chapter 10. Outsourcing

Chapter 11. Effective Records Management

Chapter 12. Performance Assessment

Chapter 13. Health and Safety

Chapter 14. Human Resources

Chapter 15. Certification for the Laboratory

Chapter 16. Emerging Issues

About the Author

David Watson heads up Forensic Computing Ltd, a specialist forensic recovery and investigation company. He is responsible for the coordination and efficient delivery of the computer forensic and electronic evidence recovery services, digital investigations, and provides support for a broad range of investigative, security and risk consulting assignments. He is a Certified Fraud Examiner (CFE) and a Certified Information Forensic Investigator (CIFI), a Certified Computer Crime Investigator (CCCI), an Advanced Certified Computer Forensics Technician (CCFT). In addition to specialised forensic certifications he is a Certified Information Security Systems Professional (CISSP), a Certified Information Systems Manager (CISM) and a Certified Information Systems Auditor (CISA). David has also led Forensic Computing Ltd to ISO 27001 and ISO 9001 certification, making FCL one of very few consultancies to hold such important credentials in the field of forensic services. After 25 years service with the British Army's Intelligence Corps, Andy Jones became a business manager and a researcher and analyst in the area of Information Warfare and computer crime at a defence research establishment. In Sept 2002, on completion of a paper on a method for the metrication of the threats to information systems, he left the defence environment to take up a post as a principal lecturer at the University of Glamorgan in the subjects of Network Security and Computer Crime and as a researcher on the Threats to Information Systems and Computer Forensics. At the university he developed and managed a well equipped Computer Forensics Laboratory and took the lead on a large number of computer investigations and data recovery tasks. He holds a Ph.D. in the area of threats to information systems. In January 2005 he joined the Security Research Centre at BT where he became a Chief Researcher and the head of information. Andy now holds a post as a visiting Professor at Edith Cowan University in Perth, Australia and he is currently the Programme Chair for the M.Sc. in Information Security at Khalifa University in Sharjah, UAE.

Reviews

"With this book you have a finely detailed chart guiding you through every aspect of creating, using and documenting processes that will make you compliant with both the formal accreditation standards and less formal, but no less important, industry best practices…if you are running – or plan to run – a digital forensics business, then this will provide a template for everything you do." --Network Security, May 2014

"It is clear that the authors bring real-world experience to the book, covering the whole life cycle of digital forensics investigations, gathering evidence, and chain of custody results…it will be a very useful handbook for future experts, especially those charged with setting up a forensic laboratory or those seeking accreditation and certification of an existing laboratory." --ComputingReviews.com, February 19, 2014

"…this volume on digital forensics and investigation provides information on best practices for meeting regulatory requirements and gaining and maintaining certifications and accreditation within the digital forensics field. The work is divided into three sections covering initial policies and procedures for setting up a laboratory, operating procedures and continuing policies, and accreditation standards and requirements."--ProtoView.com, February 2014

"What the book does do is provide a comprehensive and all-inclusive set of details that covers the entire lifecycle of a digital forensics investigation, ensuing evidence gathered, and chain of custody that results…Authors David Lilburn Watson and Andrew Jones bring decades of detailed real-world experience to the book, which readers are certain to find to be a unique reference."--RSAConference.com, December 16, 2013

Ask a Question About this Product More...
 
Item ships from and is sold by Fishpond World Ltd.

Back to top