Commencez à lire Placing the Suspect Behind the Keyboard sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
 
Agrandissez cette image
 

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects [Format Kindle]

Brett Shavers

Prix conseillé : EUR 44,24 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 45,31
Prix Kindle : EUR 30,97 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 14,34 (32%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 30,97  
Broché EUR 45,31  
-40%, -50%, -60%... Découvrez les Soldes Amazon jusqu'au 5 août 2014 inclus. Profitez-en !





Descriptions du produit

Revue de presse

"Shavers, with a background in the military and law enforcement, offers a comprehensive look at the unique complexities that can be involved in civil and criminal investigation where digital technologies play a significant and often deciding role. The book delves into the many aspects of digital investigations. Techniques of analysis for both 'live' (powered on) and 'dead' (powered off) computers are discussed. Suspect and victim interview techniques unique to digital investigations are presented."--Reference & Research Book News, December 2013 "I would highly recommend the book to anyone in the field of digital investigation, computer forensics, or who may just have an interest in the fascinating world of cybercrime investigation. This is a must read for any aspiring novice cybercrime investigator and the seasoned professional computer guru as well as a needed addition to any digital investigator's library."--Journal of Digital Forensics, Security and Law, Volume 8(2), 2013 "This book offers a complete picture of a cybercrime investigation, and with the author's clear and interesting writing, it manages to give aspiring digital forensic investigators a good idea of what such a job entails when working with law enforcement. It's a very easy and engaging read."--Help Net Security online, September 5, 2013

Présentation de l'éditeur

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.



• Learn the tools and investigative principles of both physical and digital cybercrime investigations—and how they fit together to build a solid and complete case.

• Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard."

• The only book to combine physical and digital investigative techniques.


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4327 KB
  • Nombre de pages de l'édition imprimée : 266 pages
  • Editeur : Syngress; Édition : 1 (1 février 2013)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00BKY4QSW
  • Synthèse vocale : Activée
  • X-Ray :
  • Classement des meilleures ventes d'Amazon: n°191.047 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.3 étoiles sur 5  6 commentaires
5 internautes sur 6 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 IDENTIFYING THE CYBER CRIMINAL!! 5 mai 2013
Par COSMIC TRAVELER - Publié sur Amazon.com
Format:Broché
Are you an investigator in law enforcement? If you are, then this book is for you! Author Brett Shavers, has done an outstanding job of writing a book that places the suspect behind the keyboard through a combination of digital forensics techniques and more traditional, non-technical investigative methods.

Author Shavers, begins by reminding you that depending upon the type of digital evidence, the type of investigation, and whether the suspect has been already identified, the manner of collection of the data will differ. In addition, the author discusses the questions that are needed for interrogations that are related to computer-related investigations. He then focuses on physical investigations, detailing only those points that are useful in supporting currently available electronic evidence, or finding additional sources of electronic evidence. The author then, covers the principles of extracting and interpreting digital evidence that can help place the suspect behind the keyboard. Next, he shows you how to identify the suspect; as well as, eliminating possible suspects by helping to develop your investigative mindset. In addition, the author introduces several methods, which may allow you to see inferences as you manage the information in your case. He continues by discussing methods of presenting electronic evidence for a variety of audiences. Then, the author shows you how to use reference materials as a constant reminder of staying the course in a case of placing the suspect behind the keyboard. Next, he discusses how technological changes make it easier for digital forensics and the investigator's ability to place a suspect behind a keyboard; and, how other times, these changes can make it difficult or impossible. In addition, the author shows you advanced techniques to search for information beyond simply using a search engine. Finally, he shows you a collection of briefed examples across a wide range of case studies.

Although the theme of this most excellent book primarily supports criminal investigations, many of the same methods and processes can be used in civil litigation and internal corporate matters. Perhaps more importantly, the principles presented in this great book are meant to be principles, not an absolute checklist, but a guide.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 I got the big picture now 16 septembre 2013
Par Frank Shells - Publié sur Amazon.com
Format:Broché
The title of this book caught my eye, as did the price (it's higher than I usually spend for any book). But, because of the title, I bought it anyway hoping that it would answer the question on how to really put someone at a keyboard. The book was easy to read and thankfully, not too technical. I have a few digital forensics courses under my belt but I am far from being an expert. I also do not have police experience for investigations.

For my consulting work, I dabble a bit in forensics, but only what I am good at with the rest being subcontracted to experts (if it's Windows, I can do it, Mac, I'd rather not). There have been a few cases where I have been retained by law firms that either the defendant or plaintiff denied committing alleged acts of theft or malicious computer behavior. Almost all of these cases, the suspects have blamed others in their offices or homes or hackers. After reading this book, I finally got the big picture of how to get enough evidence, both electronic and other types of evidence, to affirmatively place the suspect at the keyboard, at the time of the incident.

I really liked the cheat sheets, the case management and presentation ideas, and the detailed actual case studies. The book took me through the entire process of case management, from start to end, with more advice and tips than I expected. When I say I finally get the big picture, I mean that in a way that I can see how police experience with investigating crimes can be a big benefit in civil litigation. I recommend this book to attorneys who deal in cyber related cases and any digital forensics examiner who could use a dozen tips about looking at the big picture and using investigative methods I would have never thought of.

Since the book is not heavy on technical descriptions, I thought I would not get as much benefit, but there were more references to describe forensics to make up for a lack in technical details. I can see why the book was written the way it was written. It really can benefit a wide audience from the examiner to the lawyer in court.

I enjoyed the book as an entertaining read that gave well needed information.
4.0 étoiles sur 5 Review of "Placing the Suspect Behind the Keyboard" 26 août 2013
Par norcyn - Publié sur Amazon.com
Format:Broché
If you are looking to learn more about the field of digital forensics, then this book offered by O'Reilly Media, will serve as an excellent guide. Written by Brett Shavers; as a former law enforcement officer he spent most of his career dedicated to digital forensics. Today, he continues to speak at conferences, blog, and work as an honorary member of the Computer Technology Investigators Network.

You have been assigned to your first digital evidence seizure mission and you arrive at the crime site, now what? You determine that the system is "live" with encryption and volatile memory is needed. Would you know what to do? Brett has developed a data acquisition decision making flow chart to assist investigators like you.

With this book you'll discover how to combine digital forensic techniques with more traditional, non-technical investigative methods. Beware that you will not read through this book in a linear fashion but rather refer to specific topics of interest as it is written with great detail. Some of the topics included are: collecting electronic data, questioning a suspect, physical and electronic surveillance, circumstantial and corroborating evidence, case presentation, and cheat sheets to stay on track.
4.0 étoiles sur 5 Good read for a technical book 26 août 2013
Par NSlone - Publié sur Amazon.com
Format:Format Kindle
I have had a hard time trying to write this review, not because of the way the book is written, but rather I had a hard time putting my thoughts in order for this project. I like the way the book is written, and had no problems reading it on my Kindle. Believe me, there are books I've had to return for a refund because of illegibility.
Placing the Suspect Behind the Keyboard is great for those who wish to learn forensic science in order to learn how to catch the subject and make sure it isn't the victim or an unsuspecting third party, such as if someone were to loan their PC to someone else.
Personally I allow no one to use my PC. That is just my preference. There are so many cybercrimes being committed in today's digital world that we should all be given an enlightening class in cybercrimes. Perhaps then we would be better prepared if someone did steal our laptops, net books, Macs, etc. It might even help in the case of identity theft.
There are many kinds of cybercrimes being committed on a daily bases, and I would rather someone read this book among others and investigate it right than to think someone else did it than to catch the real culprit.
I found the book to be informative and rather interesting, even though it is written in novelistic, technical manner.
4.0 étoiles sur 5 Methodical Case Preparation 12 août 2013
Par J. W. Rine - Publié sur Amazon.com
Format:Broché
Placing the Suspect Behind the keyboard details the investigative process of building a cyber-crime case. The book outlines methods of collecting evidence, maintaining a chain of custody, preparing a case, and presenting the facts of evidence in the case.

I liked the section of questioning a suspect. I found it to be entertaining as well as informative. The discussion of physical and electronic surveillance provided for interesting reading as well. The author was careful to point out the dangers of doing a sloppy job resulting in innocent people being wrongfully accused. The book is centered around the Windows operating system with mentions of Mac and Linux. This should not be a surprise given the number of Windows users when compared to other operating systems. The case studies also provided interesting reading.

I read this book on my Kindle Touch and the graphics were to small to be of any use. Reading a PDF version on the computer eliminates that problem. I will recommend the book with the following caveats. I feel this book will be highly useful to a very narrow audience of legal professionals involved with cyber-crime. Others may enjoy reading it from a curiosity standpoint. It does not contain hands on digital forensics information, however there are links that may prove useful in that regard.

Disclosure: I received a free ebook copy for review.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique