- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Guide to Computer Forensics and Investigations Paperback – Sep 3 2003
There is a newer edition of this item:
Special Offers and Product Promotions
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
About the Author
Amelia Phillips is a graduate of the Massachusetts Institute of Technology and has worked for more than 30 years in government, private industry, and academics. She has designed distance education classes and e-commerce, computer forensics, and network security programs at several community colleges. Amelia is Chair of the Pure and Applied Science Division at Highline Community College, a Fulbright Scholar, and a recent PhD in computer security.
Bill Nelson has been a computer forensics examiner for a Fortune 50 company for the past 12 years and has developed high-tech investigation programs for professional organizations and colleges. His previous experience includes AFIS software engineering and reserve police work.
Frank Enfinger, from Suquamish, Washington, is a tenured faculty member at North Seattle Community College and a Computer Forensics Specialist with a local police department. He holds a degree in Computer Science.
Christopher Steuart is one of the founders and the staff attorney for IT Forensics.com. Previously, he was an information systems security specialist for a Fortune 50 company and the United States government. Chris resides in Seattle, Washington.
Top Customer Reviews
The information regarding digital signatures is incorrect. Much of the information regarding partitions is incorrect. The information in regards to boot structures and MACS is scant, and what is there has been copied from existing web pages. Only enough information on NT and the MFT to confuse and confound.
The exercises are hard to follow, and even suggest using a different operating system if they do not work. The examiner cannot switch the operating system on the drive being examined - this is ridiculous.
The book is written with the primary audience of law enforcement. If a law enforcement officer were to have this book as their only education in computer forensics, their testimony would never stand up. I truly doubt that the material covered is sufficient to allow one to pass the IACIS certification.
A competent forensic examiner would not use this book other than as a reference for using DriveSpy.
p. 11: "Until 1993, the laws defining computer crimes did not exist. To this day, many have yet to be tested in court." HUH????? The fed.s proposed the first one in 1977, Florida and Arizona passed the first two computer crime statutes in 1978, and the feds finally got theirs through (18 USC 1029 & 1030) in 1986.
In another place, they talk about commmercial forensics software only being available recently, which ignores the decades of work done by experts using Norton's DiskEdit (still in use today). They barely mention Dan Mares, who wrote some of the first forensics tools, and is still doing so.
They don't really explain what their relationship is with a particular vendor whose software and hardware products are covered in detail.... and their description of the IACIS certification process is out of date. IACIS (an organization to which I belong and from which I received my computer forensics certification) has not endorsed this book.
It covers boot structures, forensic tools, evidence reporting, and all the way to being an expert witness.
I also use this book to teach a condensed version of the subject at Cal State Fullerton Extended Education.
Hope this info help!
Most recent customer reviews
As a new examiner, I found this book somewhat useful, but I thought the book was edited horribly. It looks to me as though the publisher hired an English major to edit a Computer... Read morePublished on May 19 2004 by Jim
The majority of exercises do not work. I found myself having to create exercises for my students to follow so I switched books. Read morePublished on April 22 2004
Look for similar items by category
- Books > Computers & Technology > History & Culture > Security
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Security & Encryption > Forensics
- Books > Computers & Technology > Software
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Law > Criminal Law > Law Enforcement
- Books > Politics & Social Sciences > Crime & Criminals > Forensic Science
- Books > Politics & Social Sciences > Crime & Criminals > Law Enforcement
- Books > Textbooks > Computer Science & Information Systems > Computer Science
- Books > Textbooks > Computer Science & Information Systems > Networking
- Books > Textbooks > Law