Digital Evidence and Computer Crime, 2/e (Hardcover)
暫譯: 數位證據與電腦犯罪,第二版 (精裝本)

Eoghan Casey BS MA

買這商品的人也買了...

相關主題

商品描述

Description      

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,
collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.
This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.
Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about:

  • Components of computer networks
  • Use of computer networks in an investigation
  • Abuse of computer networks
  • Privacy and security issues on computer networks
  • The law as it applies to computer networks
  • Table of Contents 

  • Part 1

    Chapter 1: Digital Evidence and Computer Crime
    1.1) Digital Evidence
    1.2) Increasing Awareness of Digital Evidence
    1.3) Challenging Aspects of Digital Evidence
    1.4) Following the Cybertrail
    1.5) Challenging Aspects of the Cybertrail
    1.6) Forensic Science and Digital Evidence
    1.7) Summary

    Chapter 2: History and Terminology of Computer Crime Investigation
    2.1) Brief History of Computer Crime Investigation
    2.2) Evolution of Investigative Tools
    2.3) Language of Computer Crime Investigation
    2.3.1) The Role of Computers in Crime
    2.4) Summary

    Chapter 3: Technology and Law
    Part A: Technology and Law - A United States Perspective
    Robert Dunne
    A.1) Jurisdiction
    A.2) Pornography and Obscenity
    A.3) Privacy
    A.4) Copyrights and the "Theft" of Digital Intellectual Property

    Part B: Computer Misuse in America
    Eoghan Casey

    Part C: Technology and Criminal Law - A European perspective
    Tessa Robinson
    C.1) Overview of Criminal Offenses
    C.2) Search and Seizure
    C.3) Jurisdiction and Extradition
    C.4) Penalties
    C.5) Privacy
    C.6) Summary

    Chapter 4: The Investigative Process
    Eoghan Casey and Gary Palmer
    4.1) The Role of Digital Evidence
    4.2) Investigative Methodology
    4.2.1) Accusation or Incident Alert
    4.2.2) Assessment of Worth
    4.2.3) Incident/Crime Scene Protocols
    4.2.4) Identification or Seizure
    4.2.5) Preservation
    4.2.6) Recovery
    4.2.7) Harvesting
    4.2.8) Reduction
    4.2.9) Organization and Search
    4.2.10) Analysis
    4.2.11) Reporting
    4.2.12) Persuasion and Testimony
    4.3) Summary

    Chapter 5: Investigative Reconstruction
    Eoghan Casey and Brent Turvey
    5.1) Equivocal Forensic Analysis
    5.1.1) Reconstruction
    5.1.2) Temporal Analysis
    5.1.3) Relational Analysis
    5.1.4) Functional Analysis
    5.2) Victimology
    5.2.1) Victimology
    5.3) Crime Scene Characteristics
    5.3.1) Method of Approach and Control
    5.3.2) Offender Action, Inaction and Reaction
    5.4) Evidence Dynamic and Introduction of Error
    5.5) Reporting
    5.6) Summary

    Chapter 6: Modus Operandi, Motive & Technology
    Brent Turvey
    6.1) Axes to Pathological Criminals, and Other Unintended Consequences
    6.2) Modus Operandi
    6.3) Technology and Modus Operandi
    6.4) Motive and Technology
    6.4.1) Power Reassurance (Compensatory)
    6.4.2) Power Assertive (Entitlement)
    6.4.3) Anger Retaliatory (Anger or Displaced)
    6.4.4) Anger Excitation (Sadistic)
    6.4.5) Profit Oriented
    6.5) Current Technologies
    6.5.1) A Computer Virus
    6.5.2) A Public Email Discussion List
    6.6) Summary

    Chapter 7: Digital Evidence in the Courtroom
    7.1) Admissibility - Warrants
    7.2) Authenticity and Reliability
    7.3) Casey's Certainty Scale
    7.4) Best Evidence
    7.5) Direct versus Circumstantial Evidence
    7.6) Hearsay
    7.6.1) Hearsay Exceptions
    7.7) Scientific Evidence
    7.8) Presenting Digital Evidence
    7.9) Summary

    Part 2: Computers

    Chapter 8: Computer Basics for Digital Evidence Examiners
    8.1) A Brief History of Computers
    8.2) Basic Operation of Computers
    8.2.1) Central Processing Unit (CPU)
    8.2.2) Basic Input and Output System (BIOS)
    8.2.3) Power-on Self Test and CMOS Configuration Tool
    8.2.4) Disk Boot
    8.3) Representation of Data
    8.4) Storage Media and Data Hiding
    8.5) File Systems and Location of Data
    8.6) Overview of Encryption
    8.6.1) Private Key Encryption
    8.6.2) Public Key Encryption
    8.6.3) Pretty Good Privacy
    8.9) Summary

    Chapter 9: Applying Forensic Science to Computers
    9.1) Authorization and Preparation
    9.2) Identification
    9.2.1) Recognizing Hardware
    9.2.2) Identifying Digital Evidence
    9.3) Documentation
    9.3.1) Message Digests and Digital Signatures
    9.4) Collection and Preservation
    9.4.1) Collecting and Preserving Hardware
    9.4.2) Collecting and Preserving Digital Evidence
    9.5) Examination and Analysis
    9.5.1) Filtering/Reduction
    9.5.2) Class/Individual Characteristics and Evaluation of Source
    9.5.3) Data Recovery/Salvage
    9.6) Reconstruction
    9.6.1) Functional Analysis
    9.6.2) Relational Analysis
    9.6.3) Temporal Analysis
    9.6.4) Digital Stratigraphy
    9.7) Reporting
    9.8) Summary

    Chapter 10: Forensic Analysis of Windows Systems
    10.1) Windows Evidence Acquisition Boot Disk
    10.2) File Systems
    10.3) Overview of Digital Evidence Processing Tools
    10.4) Data Recovery
    10.4.1) Windows-based Recovery Tools
    10.4.2) Unix-based Recovery Tools
    10.4.3) File Carving with Windows
    10.4.4) Dealing with Password Protection and Encryption
    10.5) Log Files
    10.6) File System Traces
    10.7) Registry
    10.8) Internet Traces
    10.8.1) Web Browsing
    10.8.2) Usenet Access
    10.8.3) E-mail
    10.8.4) Other Applications
    10.8.5) Network Storage
    10.9) Program Analysis
    10.10) Summary

    Chapter 11: Forensic Analysis of Unix Systems
    11.1) Unix Evidence Acquisition Boot Disk
    11.2) File Systems
    11.3) Overview of Digital Evidence Processing Tools
    11.4) Data Recovery
    11.4.1) Unix-based Tools
    11.4.2) Windows-based Tools
    11.4.3) File Carving with Unix
    11.4.4) Dealing with Password Protection and Encryption
    11.5) Log Files
    11.6) File System Traces
    11.7) Internet Traces
    11.7.1) Web Browsing
    11.7.2) E-mail
    11.7.3) Network Traces
    11.8) Summary

    Chapter 12: Forensic Analysis of Macintosh Systems
    12.1) File Systems
    12.2) Overview of Digital Evidence Processing Tools
    12.3) Data Recovery
    12.4) File System Traces
    12.5) Internet Traces
    12.5.1) Web Activity
    12.5.2) E-mail
    12.5.3) Network Storage
    12.6) Summary

    Chapter 13: Forensic Analysis of Handheld Devices
    13.1) Overview of Handheld Devices
    13.1.1) Memory
    13.1.2) Data Storage and Manipulation
    13.1.3) Exploring Palm Memory
    13.2) Collection and Examination of Handheld Devices
    13.2.1) Palm OS
    13.2.2) Windows CE Devices
    13.2.3) RIM Blackberry
    13.2.4) Mobile Phones
    13.3) Dealing with Password Protection and Encryption
    13.4) Related Sources of Digital Evidence
    13.4.1) Removable Media
    13.4.2) Neighborhood Data
    13.5) Summary
    Part 3: Networks

    Chapter 14: Network Basics for Digital Evidence Examiners
    14.1) A Brief History of Computer Networks
    14.2) Technical overview of networks
    14.3) Network Technologies
    14.3.1) Attached Resource Computer Network (ARCNET)
    14.3.2) Ethernet
    14.3.3) Fiber Distributed Data Interface (FDDI)
    14.3.4) Asynchronous Transfer Mode (ATM)
    14.3.5) IEEE 802.11 (Wireless)
    14.3.6) Cellular Networks
    14.3.7) Satellite Networks
    14.4) Connecting Networks Using Internet Protocols
    14.4.1) Physical and Data-Link Layers (Layers 1 & 2)
    14.4.2) Network and Transport Layers (Layers 3 & 4)
    14.4.3) Session Layer (Layer 5)
    14.4.4) Presentation Layer (Layer 6)
    14.4.5) Application Layer (Layer 7)
    14.4.6) Synopsis of the OSI Reference Model
    14.5) Summary

    Chapter 15: Applying Forensic Science to Networks
    15.1) Preparation and Authorization
    15.2) Identification
    15.3) Documentation, Collection, and Preservation
    15.4) Filtering and Data Reduction
    15.5) Class/Individual Characteristics and Evaluation of Source
    15.6) Evidence Recovery
    15.7) Investigative Reconstruction
    15.7.1) Behavioral Evidence Analysis
    15.8) Summary

    Chapter 16: Digital Evidence on Physical and Data-Link Layers
    16.1) Ethernet
    16.1.1) 10Base5
    16.1.2) 10/100BaseT
    16.1.3) CSMA/CD
    16.2) Linking the Data-Link and Network Layers—Encapsulation
    16.2.1) Address Resolution Protocol (ARP)
    16.2.2) Point to Point Protocol and Serial Line Internet Protocol
    16.3) Ethernet versus ATM Networks
    16.4) Documentation, Collection, and Preservation
    16.4.1) Sniffer Placement
    16.4.2) Sniffer Configuration
    16.4.3) Other Source of MAC Addresses
    16.5) Analysis Tools and Techniques
    16.5.1) Keyword Searches
    16.5.2) Filtering and Classification
    16.5.3) Reconstruction
    16.6) Summary

    Chapter 17: Digital Evidence on Network and Transport Layers
    17.1) TCP/IP
    17.1.1) Internet Protocol and Cellular Data Networks
    17.1.2) IP Addresses
    17.1.3) Domain Name System
    17.1.4) IP Routing
    17.1.5) Servers and Ports
    17.1.6) Connection Management
    17.1.7) Abuses of TCP/IP
    17.2) Setting up A Network
    17.2.1) Static versus Dynamic IP Address Assignment
    17.2.2) Protocols for Assigning IP Addresses
    17.3) TCP/IP Related Digital Evidence
    17.3.1) Authentication Logs
    17.3.2) Server Logs
    17.3.3) Operating System Logs
    17.3.4) Network Device Logs
    17.3.5) State Tables
    17.3.6) Random Access Memory Contents
    17.4) Summary

    Chapter 18: Digital Evidence on the Internet
    18.1) Role of the Internet in Criminal Investigations
    18.2) Internet Services: Legitimate versus Criminal Uses
    18.2.1) The World Wide Web
    18.2.2) E-mail
    18.2.3) Newsgroups
    18.2.4) Synchronous Chat Networks
    18.2.5) Peer-To-Peer Networks and Instant Messaging
    18.3) Using the Internet as an Investigative Tool
    18.3.1) Search Engines
    18.3.2) Online Databases (the Invisible Web)
    18.3.3) Usenet Archive versus Actual Newgroups
    18.4) Online Anonymity and Self-Protection
    18.4.1) Overview of Exposure
    18.4.2) Proxies
    18.4.3) IRC "bots"
    18.4.5) Encryption
    18.4.5) Anonymous and Pseudonymous E-mail and Usenet
    18.4.6) Freenet
    18.4.7) Anonymous Cash
    18.5) E-mail Forgery and Tracking
    18.5.1) Interpreting E-mail Headers
    18.6) Usenet Forgery and Tracking
    18.6.1) Interpreting Usenet Headers
    18.7) Searching and Tracking on IRC
    18.8) Summary

    Part 4: Investigating Computer Crime

    Chapter 19: Investigating Computer Intrusions
    19.1) How Computer Intruders Operate
    19.2) Investigating Intrusions
    19.2.1) Processes as a Source of Evidence (Windows)
    19.2.2) Processes as a Source of Evidence (Unix)
    19.2.3) Windows Registry
    19.2.4) Acquisition over Network
    19.2.5) Classification, Comparison, and Evaluation of Source
    19.3) Investigative Reconstruction
    19.3.1) Parallels between Arson and Intrusion Investigations
    19.3.2) Crime Scene Characteristics
    19.3.3) Automated and Dynamic Modus Operandi
    19.3.4) Examining the Intruder's Computer
    19.4) Detailed Case Example
    19.5) Summary

    Chapter 20: Sex Offenders on the Internet
    Eoghan Casey, Monique Mattei Ferraro, Michael McGrath
    20.1) Window to the World
    20.2) Legal Considerations
    20.3) Identifying and Processing Digital Evidence
    20.4) Investigating Online Sexual Offenders
    20.4.1) Undercover Investigation
    20.5) Investigative Reconstruction
    20.5.1) Analyzing Sex Offenders
    20.5.2) Analyzing Victim Behavior
    20.5.3) Crime Scene Characteristics
    20.5.4) Motivation
    20.6) Summary

    Chapter 21: Investigating Cyberstalking
    21.1) How Cyberstalkers Operate
    21.1.1) Acquiring Victims
    21.1.2) Anonymity and Surreptitious Monitoring
    21.1.3) Escalation and Violence
    21.2) Investigating Cyberstalking
    21.2.1) Interviews
    21.2.2) Victimology
    21.2.3) Risk Assessment
    21.2.4) Search
    21.2.5) Crime Scene Characteristics
    21.2.6) Motivation
    21.3) Cyberstalking Case Example
    21.4) Summary

    Chapter 22: Digital Evidence as Alibi
    22.1) Investigating an Alibi
    22.2) Time as Alibi
    22.3) Location as Alibi
    22.4) Summary

    Part 4: Guidelines

    Chapter 23: Handling the Digital Crime Scene
    23.1) Identification or Seizure
    23.1.1) When the Entire Computer is Required
    23.2) Preservation
    23.2.1) If Only a Portion of the Digital Evidence on a Computer is Required
    23.2.2) Sample Preservation Form

    Chapter 24: Digital Evidence Examination Guidelines
    Eoghan Casey and Troy Larson
    24.1) Preparation
    24.2) Processing
    24.2.1) DOS/Windows Command Line - Maresware
    24.2.2) Windows GUI - EnCase
    24.2.3) Windows GUI - FTK
    24.3) Identify and Process Special Files
    24.4) Summary

  •  
     

     

    商品描述(中文翻譯)

    描述
    數位證據——儲存在電腦上或由電腦傳輸的證據——在各種犯罪中扮演著重要角色,包括謀殺、強姦、綁架、兒童虐待、誘騙未成年人、兒童色情、跟蹤、騷擾、詐騙、盜竊、毒品販運、電腦入侵、間諜活動和恐怖主義。
    儘管越來越多的罪犯使用電腦和電腦網路,但很少有調查員精通與數位證據相關的證據、技術和法律問題。因此,數位證據經常被忽視、收集不當和分析無效。本書的目的是教育執法、法醫科學、電腦安全和法律界的學生和專業人士有關數位證據和電腦犯罪。
    本書解釋了電腦和網路的運作方式,它們如何參與犯罪,以及如何作為證據來源。讀者將獲得對電腦和網路運作的實際理解,以及它們如何用作犯罪證據,並將學習相關的法律問題,還將接觸到推理犯罪剖析,這是一種系統性的方法,用於聚焦調查和理解犯罪動機。
    讀者將獲得作者附帶的網站的訪問權限,該網站包含模擬案例,整合了文本中涵蓋的許多主題。這些案例經常更新,教導個人有關:
    - 電腦網路的組成部分
    - 在調查中使用電腦網路
    - 電腦網路的濫用
    - 電腦網路上的隱私和安全問題
    - 法律如何適用於電腦網路

    目錄
    第一部分
    第1章:數位證據與電腦犯罪
    1.1) 數位證據
    1.2) 對數位證據的認識日益提高
    1.3) 數位證據的挑戰性方面
    1.4) 跟隨網路痕跡
    1.5) 網路痕跡的挑戰性方面
    1.6) 法醫科學與數位證據
    1.7) 總結

    第2章:電腦犯罪調查的歷史與術語
    2.1) 電腦犯罪調查的簡史
    2.2) 調查工具的演變
    2.3) 電腦犯罪調查的語言
    2.3.1) 電腦在犯罪中的角色
    2.4) 總結

    第3章:技術與法律
    A部分:技術與法律 - 美國的視角
    Robert Dunne
    A.1) 管轄權
    A.2) 色情與猥褻
    A.3) 隱私
    A.4) 版權與數位智慧財產的「盜竊」

    B部分:美國的電腦濫用
    Eoghan Casey

    C部分:技術與刑法 - 歐洲的視角
    Tessa Robinson
    C.1) 刑事犯罪概述
    C.2) 搜查與扣押
    C.3) 管轄權與引渡
    C.4) 刑罰
    C.5) 隱私
    C.6) 總結

    第4章:調查過程
    Eoghan Casey 和 Gary Palmer
    4.1) 數位證據的角色
    4.2) 調查方法論
    4.2.1) 指控或事件警報
    4.2.2) 價值評估
    4.2.3) 事件/犯罪現場協議
    4.2.4) 識別或扣押
    4.2.5) 保存
    4.2.6) 恢復
    4.2.7) 收集
    4.2.8) 縮減
    4.2.9) 組織與搜索
    4.2.10) 分析
    4.2.11) 報告
    4.2.12) 說服與證詞
    4.3) 總結

    第5章:調查重建
    Eoghan Casey 和 Brent Turvey
    5.1) 模糊的法醫分析
    5.1.1) 重建
    5.1.2) 時間分析
    5.1.3) 關聯分析
    5.1.4) 功能分析
    5.2) 受害者學
    5.2.1) 受害者學
    5.3) 犯罪現場特徵
    5.3.1) 接近與控制的方法
    5.3.2) 罪犯的行動、不作為與反應
    5.4) 證據動態與錯誤引入
    5.5) 報告
    5.6) 總結

    第6章:作案手法、動機與技術
    Brent Turvey
    6.1) 對病態罪犯的軸心及其他意外後果
    6.2) 作案手法
    6.3) 技術與作案手法
    6.4) 動機與技術
    6.4.1) 權力保證(補償性)
    6.4.2) 權力主張(權利)
    6.4.3) 憤怒報復(憤怒或轉移)
    6.4.4) 憤怒興奮(施虐)
    6.4.5) 利潤導向
    6.5) 當前技術
    6.5.1) 電腦病毒
    6.5.2) 公共電子郵件討論列表
    6.6) 總結

    第7章:法庭上的數位證據
    7.1) 可接受性 - 搜查令
    7.2) 真實性與可靠性
    7.3) Casey的確定性量表
    7.4) 最佳證據
    7.5) 直接證據與間接證據
    7.6) 傳聞
    7.6.1) 傳聞例外
    7.7) 科學證據
    7.8) 提交數位證據
    7.9) 總結

    第二部分:電腦
    第8章:數位證據檢查員的電腦基礎知識
    8.1) 電腦的簡史
    8.2) 電腦的基本操作
    8.2.1) 中央處理單元(CPU)
    8.2.2) 基本輸入輸出系統(BIOS)
    8.2.3) 開機自檢與CMOS配置工具
    8.2.4) 磁碟啟動
    8.3) 數據的表示
    8.4) 儲存媒介與數據隱藏
    8.5) 檔案系統與數據位置
    8.6) 加密概述
    8.6.1) 私鑰加密
    8.6.2) 公鑰加密
    8.6.3) Pretty Good Privacy
    8.9) 總結

    第9章:將法醫科學應用於電腦
    9.1) 授權與準備
    9.2) 識別
    9.2.1) 硬體識別
    9.2.2) 識別數位證據
    9.3) 文件記錄
    9.3.1) 訊息摘要與數位簽名
    9.4) 收集與保存
    9.4.1) 收集與保存硬體
    9.4.2) 收集與保存數位證據
    9.5) 檢查與分析
    9.5.1) 過濾/縮減
    9.5.2) 類別/個別特徵與來源評估
    9.5.3) 數據恢復/挽救
    9.6) 重建
    9.6.1) 功能分析
    9.6.2) 關聯分析
    9.6.3) 時間分析
    9.6.4) 數位地層學
    9.7) 報告
    9.8) 總結

    第10章:Windows系統的法醫分析
    10.1) Windows證據獲取啟動磁碟
    10.2) 檔案系統
    10.3) 數位證據處理工具概述
    10.4) 數據恢復
    10.4.1) 基於Windows的恢復工具
    10.4.2) 基於Unix的恢復工具
    10.4.3) 使用Windows的檔案雕刻
    10.4.4) 處理密碼保護與加密
    10.5) 日誌檔案
    10.6) 檔案系統痕跡
    10.7) 註冊表
    10.8) 網際網路痕跡
    10.8.1) 網頁瀏覽
    10.8.2) Usenet訪問
    10.8.3) 電子郵件
    10.8.4) 其他應用程式
    10.8.5) 網路儲存
    10.9) 程式分析
    10.10) 總結

    第11章:Unix系統的法醫分析
    11.1) Unix證據獲取啟動磁碟
    11.2) 檔案系統
    11.3) 數位證據處理工具概述
    11.4) 數據恢復
    11.4.1) 基於Unix的工具
    11.4.2) 基於Windows的工具
    11.4.3) 使用Unix的檔案雕刻
    11.4.4) 處理密碼保護與加密
    11.5) 日誌檔案
    11.6) 檔案系統痕跡
    11.7) 網際網路痕跡
    11.7.1) 網頁瀏覽
    11.7.2) 電子郵件
    11.7.3) 網路痕跡
    11.8) 總結

    第12章:Macintosh系統的法醫分析
    12.1) 檔案系統
    12.2) 數位證據處理工具概述
    12.3) 數據恢復
    12.4) 檔案系統痕跡
    12.5) 網際網路痕跡
    12.5.1) 網頁活動
    12.5.2) 電子郵件
    12.5.3) 網路儲存
    12.6) 總結

    第13章:手持設備的法醫分析
    13.1) 手持設備概述
    13.1.1) 記憶體
    13.1.2) 數據儲存與操作
    13.1.3) 探索Palm記憶體
    13.2) 手持設備的收集與檢查
    13.2.1) Palm OS
    13.2.2) Windows CE設備
    13.2.3) RIM Blackberry
    13.2.4) 行動電話
    13.3) 處理密碼保護與加密
    13.4) 相關的數位證據來源
    13.4.1) 可移動媒介
    13.4.2) 鄰近數據
    13.5) 總結

    第三部分:網路
    第14章:數位證據檢查員的網路基礎知識
    14.1) 電腦網路的簡史
    14.2) 網路的技術概述
    14.3) 網路技術
    14.3.1) 附加資源電腦網路(ARCNET)
    14.3.2) 以太網
    14.3.3) 光纖分佈數據介面(FDDI)
    14.3.4) 非同步傳輸模式(ATM)
    14.3.5) IEEE 802.11(無線)
    14.3.6) 行動網路
    14.3.7) 衛星網路
    14.4) 使用網際網路協議連接網路
    14.4.1) 物理層和數據鏈路層(第1層和第2層)
    14.4.2) 網路層和傳輸層(第3層和第4層)
    14.4.3) 會話層(第5層)
    14.4.4) 表示層(第6層)
    14.4.5) 應用層(第7層)
    14.4.6) OSI參考模型的概要
    14.5) 總結

    第15章:將法醫科學應用於網路
    15.1) 準備與授權
    15.2) 識別
    15.3) 文件記錄、收集與保存
    15.4) 過濾與數據縮減
    15.5) 類別/個別特徵與來源評估
    15.6) 證據恢復
    15.7) 調查重建
    15.7.1) 行為證據分析
    15.8) 總結

    第16章:物理層和數據鏈路層上的數位證據
    16.1) 以太網
    16.1.1) 10Base5
    16.1.2) 10/100BaseT
    16.1.3) CSMA/CD
    16.2) 連接數據鏈路層和網路層——封裝
    16.2.1) 地址解析協議(ARP)
    16.2.2) 點對點協議和串行線路網際網路協議
    16.3) 以太網與ATM網路的比較
    16.4) 文件記錄、收集與保存
    16.4.1) 嗅探器放置
    16.4.2) 嗅探器配置
    16.4.3) 其他MAC地址來源
    16.5) 分析工具與技術
    16.5.1) 關鍵字搜索
    16.5.2) 過濾與分類
    16.5.3) 重建
    16.6) 總結

    第17章:網路層和傳輸層上的數位證據
    17.1) TCP/IP
    17.1.1) 網際網路協議與行動數據網路
    17.1.2) IP地址
    17.1.3) 網域名稱系統