
Find a copy in the library

WorldCat
Find it in libraries globally

Finding libraries that hold this item...
Details
Genre/Form: | Electronic books |
---|---|
Material Type: | Document, Internet resource |
Document Type: | Internet Resource, Computer File |
All Authors / Contributors: |
Suzanne Widup |
ISBN: | 9780071807913 0071807918 |
OCLC Number: | 1152994721 |
Notes: | Includes index. |
Description: | 1 online resource (xx, 426 pages :) illustrations. |
Contents: | Note continued: Appendix A Rosetta Stone for Window Operating Systems -- Appendix B EnCase Version 7 Keyboard Shortcuts -- EnCase Keyboard Shortcuts Quick Reference -- Appendix C Sample Run Books -- Creating a New Case (Chapter 2) -- Relocating Evidence Manually (Chapter 2) -- Backing Up the Current Case (Chapter 3) -- Reacquiring .E01/. Ex01 Evidence-(Chapter 3) -- Reacquiring .L01/. Lx01 Evidence (Chapter 3) -- Encrypting an Evidence File (See Reacquiring Evidence) -- Adding/Acquiring a Local irate (Chapter 4) -- Adding an EnCase Evidence File (Logical or Physical) (Chapter 4) -- Adding a Raw Image (Chapter 4) -- Acquiring a Smartphone (Chapter 4) -- Creating a New Case (Chapter 5) -- Verifying an Evidence File without Opening a Case (Chapter 5) -- Setting the lime Zone (Chapter 5) -- Processing and Preparation of Initial Case Evidence (Chapter 5) -- Mounting Files with Internal Structure (Compound Files) Individually (Chapter 6). Note continued: Collecting from a Powered-On Computer (Chapter 14) -- Collecting from a Powered-Off Computer (Chapter 14) -- Importing Evidence from EnCase Portable into EnCase Forensic (Chapter 14) -- Appendix D EnScript Class Hierarchy. Note continued: Creating a Case Plan -- Adding Evidence: Acquisitionvith EnCase Forensic -- Add Local Device -- Add Network Preview -- Add Evidence File -- Add Raw Image -- Acquire Smartphone -- Add Crossover, Preview -- EnCase Imager -- Summary -- chapter 5 Processing Evidence -- Creating the NIST Hacking Case -- Adding and Verifying the Evidence -- Setting the Time Zone in EnCase -- The EnCase Evidence Processor -- Process Prioritization -- Default or Red-Flagged Modules -- Optional Modules -- Our First Evidence Processor Run -- Summary -- chapter 6 Documenting Evidence -- Initial Case Documentation -- Files with Internal Structure -- Viewing the Evidence Processor Results -- Bookmarking Evidence Items -- Types of Bookmarks -- Viewing Bookmarks -- The Blue Check -- The Selected Box -- The Set Include (Home Plate) -- Tagging -- Managing Tags -- Summary -- chapter 7 Further Inspection -- More on the Evidence Processor Modules -- The System Info Parser (Continued). Note continued: Manually Verifying Evidence (Chapter 6) -- Regenerating the Case.sqlite Database (Chapter 8) -- Searching in the Evidence Browser (Chapter 9) -- Running an Existing Condition (Chapter 10) -- Running an Existing Filter (Chapter 10) -- Creating a Hash Library (Chapter 11) -- Creating a New Hash Set Inside the library (Chapter 11) -- Adding Results to Your Hash Library from a Case (Chapter 11) -- Importing the NSRLHash Library (Chapter 11) -- Generating a Report (Chapter 12) -- Creating a New Report Template (Chapter 12) -- Preparing a Case Package for Archiving (Chapter 13) -- Wiping a Drive with Encase (Chapter 13) -- Restoring the EnCase Portable USB Device (Chapter 14) -- Using EnCase Forensics-Requires Forensic Dangle -- Using the DVD-No Forensic Dangle Required -- Using the File Update-No Forensic Dangle Required -- Preparing Additional Storage Devices for Use with EnCase Portable (Chapter 14) -- Launching EnCase Portable Management (Chapter 14). Note continued: Processing Phase -- Analysis Phase -- Presentation Phase -- Archival Phase -- Disposal Phase -- Case Closure Criteria -- Inactive Case Review -- Archiving a Case -- Preparing a Case Package -- Physical Media Considerations -- Summary -- chapter 14 EnCase Portable and App Central -- EnCase Portable Basics -- What Is Included -- Installing from the Downloaded Product -- Installing from the DVD -- Preparing EnCase Portable for Redeployment After Use -- Restoring Using EnCase Forensic-Requires Forensic Dangle -- Restoring Using the DVD- Does Not Require a Forensic Dangle -- Restoring Using an Update File-Does Not Require a Forensic Dangle -- Preparing Additional Storage Devices for Use with Portable -- Preparing Storage Devices with EnCase Forensics-Scripted Method -- Preparing Storage Devices with Windows Explorer-Quick Method -- Managing and Configuring EnCase Portable -- The Portable Management Interface -- File Types in EnCase Portable. Note continued: Running Jobs in the Field -- Collecting from a Powerid-On Computer -- Collecting from a Powered-Off Computer -- The Report Builder -- On-Scene Analysis -- After the Collection -- Back at the Forensic Lab -- EnCase App Central -- Summary -- chapter 15 An EnScript Primer -- The Basics of EnScript -- The EnScript Environment -- The EnScript Help Function -- The EnScript Types Tab and the Class Browser -- Anatomy of an EnStript -- Our First EnScript -- Variables -- Variables and Their Scope -- Operators -- Looping Constructs-Controlling the Flow of an EnScript -- The If, Else If, and Else Statements -- The For Statement -- The While and Do While Statements -- The Break and Continue Statements -- The Switch, Case, Default Statement -- The Foreach, Forall and Forroot Statements -- The Ternary Operator -- The Debugger -- Functions -- Passing by Reference or Value -- Classes -- What Is a Class? -- The Aircraft Class -- The Constructor -- Summary. Note continued: Running the Condition -- Filters -- Running a Filter -- Editing a Filter -- Adding a New Filter -- Sharing a Filter -- Summary -- chapter 11 Hash Analysis and Timelines -- Working with Hash Sets and Libraries -- Creating a New Hash Library -- Adding Case Results to Your Hash Library -- Importing the NSRL Hash Library -- Importing Legacy Hash Results into Your Hash Library -- Running Queries Against Your Hash Libraries -- Using Hash libraries for Hash Analysis -- Viewing Timeline Data in EnCase -- Summary -- chapter 12 Reporting -- Generating Your Report -- Customizing Existing Report Templates -- Report Object Code -- Changing the Graphic on the Title Page -- Creating a New Report Template -- Using Styles -- Building the Report Tree Hierarchy -- Associating Bookmark Folders with Report Sections -- Controlling Which Sections Display -- Summary -- chapter 13 Wrapping Lip the Case -- Evidence Lifecycle Management -- The Digital Evidence Lifecycle -- Acquisition Phase. Note continued: The File Carver -- The Windows Artifact Parser -- Other Modules -- Archive -- Internet -- Thumbnails -- Email -- Registry -- Summary -- chapter 8 Analyzing the Case -- The Case Analyzer -- Windows Artifacts -- Customizing the Case Analyzer -- Case Analyzer Report Conventions -- SQLite Manager (Firefox) -- SQL Basics -- Customizing Our Report -- Parsing Email -- Outlook Express -- Web-Based Email -- Summary -- chapter 9 Keywords and Searching -- Keywords and Searching -- Logical vs. Physical Searches -- Searching in the Evidence Processor -- Viewing Search Results -- Searching in the Evidence Browser -- Evidence and Cache Locations -- Troubleshooting the Evidence Cache -- Index Searches -- Search Operators -- Using GREP Operators -- The GREP Wildcards -- Grouping and GREP -- Ranges and logical Operators -- Summary -- chapter 10 Conditions and Filters -- Conditions -- Running an Existing Condition -- Creating a New Condition -- Condition Logic -- Nesting Terms. Machine generated contents note: chapter 1 The Road to Readiness -- Forensic Readiness -- Policies -- Methodology -- Procedures -- Organizing the Work -- Infrastructure Considerations -- The Lab -- Staffing -- Summary -- chapter 2 Getting Started -- Installing the Software -- DVD Installation -- Downloaded Installation -- Creating a New Case in EnCase -- The EnCase Home Screen -- The Case Screen -- Customizing the Interface -- The Case Options -- The Global Options -- Adding Your First Evidence -- Navigating ECase -- The Tree Pane -- The Table Pane -- The View Pane -- Summary -- chapter 3 EnCase Concepts -- The EnCase Case File -- Case Backups -- The EnCase Evidence File -- Reacquiring Evidence -- Using Encryption with Ex01 and Lx01 Files -- Using Encryption to Share Files with Other Parties -- Using Encryption in a Multi-Investigator Environment -- EnCase Configuration (ini) Files -- Case Templates -- Summary -- chapter 4 Adding Evidence -- Case Study: The NIST CFReDS Hacking Case. |
Responsibility: | Suzanne Widup. |
More information: |
Abstract:
"Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.- Install EnCase Forensic v7 and customize the user interface - Prepare your investigation and set up a new case - Collect and verify evidence from suspect computers and networks - Use the EnCase Evidence Processor and Case Analyzer - Uncover clues using keyword searches and filter results through GREP - Work with bookmarks, timelines, hash sets, and libraries - Handle case closure, final disposition, and evidence destruction - Carry out field investigations using EnCase Portable - Learn to program in EnCase EnScript.
