Aims to provide police, prosecutors and forensic examiners with the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography. This book presents a history of child exploitation cases and studies, outlining the roles of technolo[...]
"The Handbook of Digital Forensics and Investigation" builds on the success of "The Handbook of Computer Crime Investigation", bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed[...]
Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. Th[...]
"Malware Forensics: Investigating and Analyzing Malicious Code" covers the emerging and evolving field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss '[...]
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, "Malware Forensics[...]