Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 33,94

EUR 14,54 (30%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects par [Shavers, Brett]
Publicité sur l'appli Kindle

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Format Kindle

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 33,94

Longueur : 266 pages Langue : Anglais

Descriptions du produit

Revue de presse

"The knowledge of the technologies and investigative procedures is broad, solid, and current. The claims are realistic and modest...the book makes a useful text for an introductory or refresher course in the investigation of cyber crimes..." --Computing Reviews, October 2014

Présentation de l'éditeur

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

  • Learn the tools and investigative principles of both physical and digital cybercrime investigations—and how they fit together to build a solid and complete case
  • Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard"
  • The only book to combine physical and digital investigative techniques

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4324 KB
  • Nombre de pages de l'édition imprimée : 266 pages
  • Editeur : Syngress; Édition : 1 (1 février 2013)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°450.825 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) HASH(0x882566cc) étoiles sur 5 7 commentaires
7 internautes sur 8 ont trouvé ce commentaire utile 
HASH(0x882b32d0) étoiles sur 5 IDENTIFYING THE CYBER CRIMINAL!! 5 mai 2013
Par COSMIC TRAVELER - Publié sur
Format: Broché
Are you an investigator in law enforcement? If you are, then this book is for you! Author Brett Shavers, has done an outstanding job of writing a book that places the suspect behind the keyboard through a combination of digital forensics techniques and more traditional, non-technical investigative methods.

Author Shavers, begins by reminding you that depending upon the type of digital evidence, the type of investigation, and whether the suspect has been already identified, the manner of collection of the data will differ. In addition, the author discusses the questions that are needed for interrogations that are related to computer-related investigations. He then focuses on physical investigations, detailing only those points that are useful in supporting currently available electronic evidence, or finding additional sources of electronic evidence. The author then, covers the principles of extracting and interpreting digital evidence that can help place the suspect behind the keyboard. Next, he shows you how to identify the suspect; as well as, eliminating possible suspects by helping to develop your investigative mindset. In addition, the author introduces several methods, which may allow you to see inferences as you manage the information in your case. He continues by discussing methods of presenting electronic evidence for a variety of audiences. Then, the author shows you how to use reference materials as a constant reminder of staying the course in a case of placing the suspect behind the keyboard. Next, he discusses how technological changes make it easier for digital forensics and the investigator's ability to place a suspect behind a keyboard; and, how other times, these changes can make it difficult or impossible. In addition, the author shows you advanced techniques to search for information beyond simply using a search engine. Finally, he shows you a collection of briefed examples across a wide range of case studies.

Although the theme of this most excellent book primarily supports criminal investigations, many of the same methods and processes can be used in civil litigation and internal corporate matters. Perhaps more importantly, the principles presented in this great book are meant to be principles, not an absolute checklist, but a guide.
2 internautes sur 2 ont trouvé ce commentaire utile 
HASH(0x882b3324) étoiles sur 5 I got the big picture now 16 septembre 2013
Par Frank Shells - Publié sur
Format: Broché
The title of this book caught my eye, as did the price (it's higher than I usually spend for any book). But, because of the title, I bought it anyway hoping that it would answer the question on how to really put someone at a keyboard. The book was easy to read and thankfully, not too technical. I have a few digital forensics courses under my belt but I am far from being an expert. I also do not have police experience for investigations.

For my consulting work, I dabble a bit in forensics, but only what I am good at with the rest being subcontracted to experts (if it's Windows, I can do it, Mac, I'd rather not). There have been a few cases where I have been retained by law firms that either the defendant or plaintiff denied committing alleged acts of theft or malicious computer behavior. Almost all of these cases, the suspects have blamed others in their offices or homes or hackers. After reading this book, I finally got the big picture of how to get enough evidence, both electronic and other types of evidence, to affirmatively place the suspect at the keyboard, at the time of the incident.

I really liked the cheat sheets, the case management and presentation ideas, and the detailed actual case studies. The book took me through the entire process of case management, from start to end, with more advice and tips than I expected. When I say I finally get the big picture, I mean that in a way that I can see how police experience with investigating crimes can be a big benefit in civil litigation. I recommend this book to attorneys who deal in cyber related cases and any digital forensics examiner who could use a dozen tips about looking at the big picture and using investigative methods I would have never thought of.

Since the book is not heavy on technical descriptions, I thought I would not get as much benefit, but there were more references to describe forensics to make up for a lack in technical details. I can see why the book was written the way it was written. It really can benefit a wide audience from the examiner to the lawyer in court.

I enjoyed the book as an entertaining read that gave well needed information.
HASH(0x882b375c) étoiles sur 5 Methodical Case Preparation 12 août 2013
Par J. W. Rine - Publié sur
Format: Broché
Placing the Suspect Behind the keyboard details the investigative process of building a cyber-crime case. The book outlines methods of collecting evidence, maintaining a chain of custody, preparing a case, and presenting the facts of evidence in the case.

I liked the section of questioning a suspect. I found it to be entertaining as well as informative. The discussion of physical and electronic surveillance provided for interesting reading as well. The author was careful to point out the dangers of doing a sloppy job resulting in innocent people being wrongfully accused. The book is centered around the Windows operating system with mentions of Mac and Linux. This should not be a surprise given the number of Windows users when compared to other operating systems. The case studies also provided interesting reading.

I read this book on my Kindle Touch and the graphics were to small to be of any use. Reading a PDF version on the computer eliminates that problem. I will recommend the book with the following caveats. I feel this book will be highly useful to a very narrow audience of legal professionals involved with cyber-crime. Others may enjoy reading it from a curiosity standpoint. It does not contain hands on digital forensics information, however there are links that may prove useful in that regard.

Disclosure: I received a free ebook copy for review.
HASH(0x882b3b28) étoiles sur 5 Review of "Placing the Suspect Behind the Keyboard" 26 août 2013
Par norcyn - Publié sur
Format: Broché
If you are looking to learn more about the field of digital forensics, then this book offered by O'Reilly Media, will serve as an excellent guide. Written by Brett Shavers; as a former law enforcement officer he spent most of his career dedicated to digital forensics. Today, he continues to speak at conferences, blog, and work as an honorary member of the Computer Technology Investigators Network.

You have been assigned to your first digital evidence seizure mission and you arrive at the crime site, now what? You determine that the system is "live" with encryption and volatile memory is needed. Would you know what to do? Brett has developed a data acquisition decision making flow chart to assist investigators like you.

With this book you'll discover how to combine digital forensic techniques with more traditional, non-technical investigative methods. Beware that you will not read through this book in a linear fashion but rather refer to specific topics of interest as it is written with great detail. Some of the topics included are: collecting electronic data, questioning a suspect, physical and electronic surveillance, circumstantial and corroborating evidence, case presentation, and cheat sheets to stay on track.
2 internautes sur 3 ont trouvé ce commentaire utile 
HASH(0x882b3c0c) étoiles sur 5 Good read for a technical book 26 août 2013
Par NSlone - Publié sur
Format: Format Kindle
I have had a hard time trying to write this review, not because of the way the book is written, but rather I had a hard time putting my thoughts in order for this project. I like the way the book is written, and had no problems reading it on my Kindle. Believe me, there are books I've had to return for a refund because of illegibility.
Placing the Suspect Behind the Keyboard is great for those who wish to learn forensic science in order to learn how to catch the subject and make sure it isn't the victim or an unsuspecting third party, such as if someone were to loan their PC to someone else.
Personally I allow no one to use my PC. That is just my preference. There are so many cybercrimes being committed in today's digital world that we should all be given an enlightening class in cybercrimes. Perhaps then we would be better prepared if someone did steal our laptops, net books, Macs, etc. It might even help in the case of identity theft.
There are many kinds of cybercrimes being committed on a daily bases, and I would rather someone read this book among others and investigate it right than to think someone else did it than to catch the real culprit.
I found the book to be informative and rather interesting, even though it is written in novelistic, technical manner.
Ces commentaires ont-ils été utiles ? Dites-le-nous