James T. Thurmanhas worked in the explosives field for more than 30 years, first as a U.S. Army bomb disposal technician and then as a special agent with the FBI. He continues to lecture and provide training on the methods of bomb scene investigation and explosives avoidance to domestic and international training schools and audiences. He is currently a professor at the Eastern Kentucky University, teaching a unique academic program on fire, arson, and explosion investigation. He holds a BA from Eastern Kentucky University and an MS Degree in Forensic Science from the George Washington University.
It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.
This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.
New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.
This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks
New in this Edition:
Information on detonation pressure and its effects on the body Instructions on how to collect additional information from the scene in order to provide an estimate of the explosives weight of the IED A glossary for a more in-depth understanding of the terms associated with explosives and the investigation processes A greatly expanded IED component identification chapter A chapter on how to expeditiously investigate a post-blast scene in a hostile environment Information on how to prepare an Investigative Report