PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
April 2002

Four computer forensics books worth investigating

Killers. Spies. Fraudsters. Child pornographers. The crimes are age-old, but computers have changed the landscape for both perpetrators and police. Serial killer John Robinson lured victims through the Internet. FBI agent-turned-spy Robert Hanssen passed encrypted data to the Russians on floppy disks. Hackers breach e-commerce Web sites to steal customers' financial information. Child pornographers, driven from using the mail, thrive on the 'Net. Computer-based crime has given rise to a new type of evidence gathering -- or forensics -- and a new breed of investigator. But computer forensics is still a young discipline, and almost no one today has been trained purely as a computer forensic analyst. Some police officers are drawn by an interest in computers, while most independent computer investigators are either former police officers or IT professionals. Forensic scientists and technicians play a critical role in law enforcement and corporate investigations. What all of these professionals have in common, however, is a need to ...

Access this PRO+ Content for Free!

Features in this issue

  • Becky Bace: The IDS security den mother

    by  Richard Thieme

    Former NSA employee and "den mother of computer security" Becky Base built an impressive and successful career that has undeniably influenced the industry.

  • Four computer forensics books worth investigating

    by  Gary C. Kessler & Michael Schirling

    Check out four computer forensics books that can help you learn the ins and outs of computer forensics technology and laws in place to manage cybercrime.

  • Do's and don'ts of building a forensics workstation

    by  Elizabeth A. Genco

    Elizabeth Genco explains the pros and cons of building a forensics workstation from scratch. Read now to learn what forensic tools are beneficial and which ones aren't.

Columns in this issue

  • Secure reads: Wireless Security

    by  Randall K. Nichols & Panos C. Lekkas

    Wireless Security offers a detailed overview of wireless security topics and covers big-picture characteristics of today's wireless security technologies.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close