A comprehensive handbook that covers the complete lifecycle of digital evidence.
Chapter 1. Introduction
Chapter 2. Forensic Laboratory Accommodation
Chapter 3. Setting up a Laboratory
Chapter 4. IT Infrastructure
Chapter 5. Incident Response
Chapter 6. Working in the Laboratory
Chapter 7. Evidence Presentation
Chapter 8. Secure Working Practices
Chapter 9. Ensuring Continuity of Operations
Chapter 10. Outsourcing
Chapter 11. Effective Records Management
Chapter 12. Performance Assessment
Chapter 13. Health and Safety
Chapter 14. Human Resources
Chapter 15. Certification for the Laboratory
Chapter 16. Emerging Issues
David Watson heads up Forensic Computing Ltd, a specialist forensic recovery and investigation company. He is responsible for the coordination and efficient delivery of the computer forensic and electronic evidence recovery services, digital investigations, and provides support for a broad range of investigative, security and risk consulting assignments. He is a Certified Fraud Examiner (CFE) and a Certified Information Forensic Investigator (CIFI), a Certified Computer Crime Investigator (CCCI), an Advanced Certified Computer Forensics Technician (CCFT). In addition to specialised forensic certifications he is a Certified Information Security Systems Professional (CISSP), a Certified Information Systems Manager (CISM) and a Certified Information Systems Auditor (CISA). David has also led Forensic Computing Ltd to ISO 27001 and ISO 9001 certification, making FCL one of very few consultancies to hold such important credentials in the field of forensic services. After 25 years service with the British Army's Intelligence Corps, Andy Jones became a business manager and a researcher and analyst in the area of Information Warfare and computer crime at a defence research establishment. In Sept 2002, on completion of a paper on a method for the metrication of the threats to information systems, he left the defence environment to take up a post as a principal lecturer at the University of Glamorgan in the subjects of Network Security and Computer Crime and as a researcher on the Threats to Information Systems and Computer Forensics. At the university he developed and managed a well equipped Computer Forensics Laboratory and took the lead on a large number of computer investigations and data recovery tasks. He holds a Ph.D. in the area of threats to information systems. In January 2005 he joined the Security Research Centre at BT where he became a Chief Researcher and the head of information. Andy now holds a post as a visiting Professor at Edith Cowan University in Perth, Australia and he is currently the Programme Chair for the M.Sc. in Information Security at Khalifa University in Sharjah, UAE.
"With this book you have a finely detailed chart guiding you
through every aspect of creating, using and documenting processes
that will make you compliant with both the formal accreditation
standards and less formal, but no less important, industry best
practices…if you are running – or plan to run – a digital forensics
business, then this will provide a template for everything you do."
--Network Security, May 2014
"It is clear that the authors bring real-world experience to the
book, covering the whole life cycle of digital forensics
investigations, gathering evidence, and chain of custody results…it
will be a very useful handbook for future experts, especially those
charged with setting up a forensic laboratory or those seeking
accreditation and certification of an existing laboratory."
--ComputingReviews.com, February 19, 2014
"…this volume on digital forensics and investigation provides
information on best practices for meeting regulatory requirements
and gaining and maintaining certifications and accreditation within
the digital forensics field. The work is divided into three
sections covering initial policies and procedures for setting up a
laboratory, operating procedures and continuing policies, and
accreditation standards and requirements."--ProtoView.com, February
2014
"What the book does do is provide a comprehensive and all-inclusive
set of details that covers the entire lifecycle of a digital
forensics investigation, ensuing evidence gathered, and chain of
custody that results…Authors David Lilburn Watson and Andrew Jones
bring decades of detailed real-world experience to the book, which
readers are certain to find to be a unique
reference."--RSAConference.com, December 16, 2013
![]() |
Ask a Question About this Product More... |
![]() |