Conduct repeatable, defensible investigations with EnCase Forensic v7
Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.
Install EnCase Forensic v7 and customize the user interface
Prepare your investigation and set up a new case
Collect and verify evidence from suspect computers and networks
Use the EnCase Evidence Processor and Case Analyzer
Uncover clues using keyword searches and filter results through GREP
Work with bookmarks, timelines, hash sets, and libraries
Handle case closure, final disposition, and evidence destruction
Carry out field investigations using EnCase Portable
Learn to program in EnCase EnScript
Suzanne Widup has a wealth of experience in security engineering and analysis with a specialty in digital forensics in large enterprise environments. Her current work involves data breach research, including tracking publicly disclosed data breaches in the VERIS Community Database (VCDB). Suzanne is the founder of the Digital Forensics Association.
Keywords: DIGITAL FORENSIC ANALYSIS, DIGITAL FORENSICS INVESTIGATION, DIGITAL FORENSICS SOFTWARE, DIGITAL FORENSICS TOOLS, COMPUTER FORENSICS AND INVESTIGATION, COMPUTER FORENSICS WITH ENCASE, COMPUTER FORENSICS AND CYBERCRIME, DIGITAL FORENSICS PROCESSING AND PROCEDURES, DIGITAL FORENSICS AND INVESTIGATION, DIGITAL FORENSICS FOR LEGAL PROFESSIONALS, DIGITAL FORENSICS FOR NETWORK, ACCESSDATA FTK, DIGITAL FORENSICS WITH THE ACCESSDATA FORENSIC TOOLKIT, INCIDENT RESPONSE AND COMPUTER FORENSICS, COMPUTER FORENSICS A BEGINNER'S GUIDE, CHFI COMPUTER HACKING FORENSIC INVESTIGATOR ALL-IN-ONE EXAM GUIDE, CCFP CERTIFIED CYBER FORENSICS PROFESSIONAL ALL-IN-ONE EXAM GUIDE, HACKING EXPOSED COMPUTER FORENSICS, 24 DEADLY SINS OF SOFTWARE SECURITY, CCNA CISCO CERTIFIED NETWORK ASSOCIATE STUDY GUIDE, CCENT CISCO CERTIFIED ENTRY NETWORKING TECHNICIAN STUDY GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE WIRELESS STUDY GUIDE, CISSP ALL-IN-ONE EXAM GUIDE, MOBILE APPLICATION SECURITY, HACKING EXPOSED MALWARE AND ROOTKITS, COMPTIA SECURITY+ CERTIFICATION STUDY GUIDE, COMPTIA SECURITY+ CERTIFICATION PRACTICE EXAMS, COMPTIA SECURITY+ ALL-IN-ONE EXAM GUIDE, SECURITY METRICS A BEGINNER'S GUIDE, WIRELESS NETWORK SECURITY A BEGINNER'S GUIDE, THE COMPUTER INCIDENT RESPONSE PLANNING HANDBOOK, MALWARE, ROOTKITS & BOTNETS, A BEGINNER'S GUIDE, CRYPTOGRAPHY A BEGINNER'S GUIDE, HACKING EXPOSED MOBILE