2008
DOI: 10.15394/jdfsl.2008.1047
|View full text |Cite
|
Sign up to set email alerts
|

Book Review: Guide to Computer Forensics and Investigations (3rd Ed.)

Abstract: Nelson, Phillips, Enfinger, and Steuart's book is about the science of computer forensics and its implications in crime investigations. This book is not intended to provide comprehensive training in computer forensics, but introduce the science the science of computer forensics and its implications in crime investigations. It focused on establishing a solid foundation for those who are new to this field. Nelson, Philips, Enfiger, and Steuart are experienced experts in different areas of computer forensics. Dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…These stages include the collection and retention of evidence for maintaining integrity and usefulness. Once identified, the evidence has a potential value and should, therefore, be collected and protected from unwanted damages that will make them unreliable, incomplete, infallible and unreliable [50]. This process is challenged in investigations involving the Cloud/Edge partly due to shared features of the Cloud/Edge environment [5,9] and reliance on the CSP to store evidence, making it available to digital investigators.…”
Section: Collection and Preservation Stagesmentioning
confidence: 99%
“…These stages include the collection and retention of evidence for maintaining integrity and usefulness. Once identified, the evidence has a potential value and should, therefore, be collected and protected from unwanted damages that will make them unreliable, incomplete, infallible and unreliable [50]. This process is challenged in investigations involving the Cloud/Edge partly due to shared features of the Cloud/Edge environment [5,9] and reliance on the CSP to store evidence, making it available to digital investigators.…”
Section: Collection and Preservation Stagesmentioning
confidence: 99%
“…Modern research on network forensics has identified several investigation techniques through which vulnerabilities and security breaches can be highlighted. Most of these investigation techniques depend on discovering, capturing, and analyzing traffic passing through the infrastructure and network devices [1]. It is necessary to determine the objective of investigating network forensics when network security suspects are present.…”
Section: Introductionmentioning
confidence: 99%