TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive HandbookJack Wiles TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
|
Contents
1 | |
Digital Forensics An Overview | 33 |
Working with Other Agencies | 65 |
Developing an Enterprise Digital Investigative Electronic Discovery Capability | 95 |
Forensic Examination in a Terabyte World | 129 |
Selecting Equipment for a Computer Forensic Laboratory | 147 |
Integrating a Quality Management System in a Digital Forensic Laboratory | 175 |
Balancing Ediscovery Challenges with Legal and IT Requirements | 207 |
Email Forensics | 237 |
Murder and Money The Story of Standards Accreditation and Certification in Computer Forensics | 261 |
Starting a Career in the Field of Techno Forensics | 277 |
Death by a Thousand Cuts By Johnny Long with Anthony Kokocinski | 315 |
Credibility Is Believability Success in the Courtroom | 369 |
395 | |
Other editions - View all
Common terms and phrases
accreditation agency agents analysis and/or electronic discovery asked Associate authentication backup Blain CAEIAE chapter collection computer forensics Computer Security conduct corporate crime customer’s cyber database develop device digital evidence digital forensic digital investigative and/or document e-discovery e-mail archive electronic discovery encryption ensure enterprise federal FireWire Flir Flir’s forensic examiner forensic laboratory forensic science forensic tools forensic workstation FTK 2.x GIAC Graduate Certificate hard disk hard drive hardware hash identify implementation Information Assurance Information Security Information Systems Security internal Internet investigative and/or electronic iPod ITT Technical Institute laptop law enforcement litigation look metadata Mitch NIST operating system organization password phase procedures professional quality system request Ryan Secret Service server standard storage stored Tableau tion U.S. Secret U.S. Secret Service write-protection