Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the... This description may be from another edition of this product.
Stephenson's book is the starting place for law enforcement and technical people who wish to move into the digital/information forensics field. The book is an easy read and leads you in proper case handling and the basics of forensic investigations. When I began investigating cyber-crime in the private sector, this was my starting point.
A qualified endorsement
Published by Thriftbooks.com User , 23 years ago
Stephenson's book does an excellent job of covering the technical details of an investigation without becoming impenetrable. The presentation follows a logical sequence. In sum, I am very impressed with the work.Potential readers should be aware that the text is written from the perspective of a corporate investigator/consultant. It does an excellent job of explaining the pitfalls of this role. Stephenson provides personal examples of dealing with the decisions made by corporate bureacracy and law enforcement that effect the work of a private security consultant. He is careful to cite the reasons for such decisions in a manner that is respectful of the process used by the decision makers; this really helps novice investigators and students maintain perspective while internalizing the results of the decisions.The book does not cover legal aspects of the investigation beyond basic evidence preservation and suggestions on when to get the lawyers involved. This is entirely expected from a corporate investigator rather than a law enforcement investigator; I respect an expert who knows when his expertise ends.That being said, take the initial sweeping comments on hackers with a grain of salt. They detract from an otherwise solid book.The greatest strength of the book is the frequent reminder that real-world investigation can be superior to the technical investigation and how the two aid each other.This book would provide an excellent bridge between an advanced investigations text (interviewing, deception detection, standard investigation, etc.) and one of the more technical computer crime forensics books.It is not a bench manual nor an investigations cookbook. Nor is it a completely non-technical writer's understanding of a computer investigation.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.