FREE Delivery in the UK.
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Handbook of Computer Crim... has been added to your Basket
+ £2.80 UK delivery
Used: Very Good | Details
Condition: Used: Very Good
Comment: Expedited shipping available on this book. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Handbook of Computer Crime Investigation: Forensic Tools and Technology Paperback – 29 Oct 2001

4 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
£35.83 £1.19
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
£49.99 FREE Delivery in the UK. In stock. Dispatched from and sold by Amazon. Gift-wrap available.

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your e-mail address or mobile phone number.

Product details

  • Paperback: 464 pages
  • Publisher: Academic Press (29 Oct. 2001)
  • Language: English
  • ISBN-10: 0121631036
  • ISBN-13: 978-0121631031
  • Product Dimensions: 16.9 x 2.7 x 24.4 cm
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 1,045,377 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description


The audience for this book is obviously the legal and law enforcement communities, so any library serving them would find this an excellent introduction. Any law firm looking to get into the field would do well to start here. - E-Streams Academic law, business or computer science collections will, however, find this book a useful introduction to an increasingly important field - even large public libraries will find an eager audience in an uncertain world. - E-Streams

About the Author

Eoghan Casey is an internationally recognized expert in data breach investigations and information security forensics. He is founding partner of, and co-manages the Risk Prevention and Response business unit at DFLabs. Over the past decade, he has consulted with many attorneys, agencies, and police departments in the United States, South America, and Europe on a wide range of digital investigations, including fraud, violent crimes, identity theft, and on-line criminal activity. Eoghan has helped organizations investigate and manage security breaches, including network intrusions with international scope. He has delivered expert testimony in civil and criminal cases, and has submitted expert reports and prepared trial exhibits for computer forensic and cyber-crime cases. In addition to his casework and writing the foundational book Digital Evidence and Computer Crime, Eoghan has worked as R&D Team Lead in the Defense Cyber Crime Institute (DCCI) at the Department of Defense Cyber Crime Center (DC3) helping enhance their operational capabilities and develop new techniques and tools. He also teaches graduate students at Johns Hopkins University Information Security Institute and created the Mobile Device Forensics course taught worldwide through the SANS Institute. He has delivered keynotes and taught workshops around the globe on various topics related to data breach investigation, digital forensics and cyber security. Eoghan has performed thousands of forensic acquisitions and examinations, including Windows and UNIX systems, Enterprise servers, smart phones, cell phones, network logs, backup tapes, and database systems. He also has information security experience, as an Information Security Officer at Yale University and in subsequent consulting work. He has performed vulnerability assessments, deployed and maintained intrusion detection systems, firewalls and public key infrastructures, and developed policies, procedures, and educational programs for a variety of organizations. Eoghan has authored advanced technical books in his areas of expertise that are used by practitioners and universities around the world, and he is Editor-in-Chief of Elsevier's International Journal of Digital Investigation.

Inside This Book

(Learn More)
First Sentence
In June 2000, when the home of alleged serial killer John Robinson was searched, five computers were collected as evidence. Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

4.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
This book is good at outlining the area of Computer Forensics, but I think it would have been better if some subjects had been covered in more detail. This aside, the areas it does cover in detail are excellent, and the others just need some reading around - the Internet is useful for this.
Comment 1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on (beta) HASH(0xa02e8bd0) out of 5 stars 8 reviews
20 of 20 people found the following review helpful
HASH(0xa019b684) out of 5 stars Computer Crime Investigation...Cookbook! 21 Feb. 2002
By Marco De Vivo - Published on
Format: Paperback Verified Purchase
What is your real interest?
If you have a strong background on computer networks, and want to know about 'true' computers forensic, then you should consider books like 'Know your Enemy' or 'Intrusion Signatures and Analysis'. Else, if you are not a computer networks expert or not even a computer professional, and want to have some knowledge about computers forensic, then this can be your book: very comprehensive, not too depth, rich of examples, and, as a bonus, covering several emerging security issues like Wireless Network Analysis and Embedded Systems Analysis.
Note, however that:
- It is not a traditional book, but rather a set of 'essays'.
- The contained material is quite biased, since several explanations seem to be more oriented toward promoting tools than to discuss the areas they are intended for.
15 of 17 people found the following review helpful
HASH(0xa019bcb4) out of 5 stars You'll find something to like in this collection of essays 13 Jan. 2002
By Richard Bejtlich - Published on
Format: Paperback
I am a senior engineer for network security operations. I bought "Handbook of Computer Crime Investigation" (HoCCI) to expand my knowledge of incident response and digital forensics. While "Incident Response" by Mandia, Prosise, and Pepe remains my top pick, HoCCI contains enough original material to qualify as recommended reading.

HoCCI is a collection of 14 distinct chapters written by 17 authors. The book's main audience appears to be law enforcement personnel, and Academic Press markets the book as a title in its "Forensic Science" catalog. The introduction states the book is written for "forensic examiners" who testify in court, although anyone performing digital forensics will find useful sections.

Some of HoCCI's strengths include numerous case studies. Ch. 2 offers examples of "ineffective" and "effective" disclosure and production of digital records in legal proceedings. Chs. 12, 13, and 14 are dedicated to factual legal and incident response scenarios. Reading these anecdotes, I perceived most of the 17 authors to be extremely familiar with their field.

Beyond helpful case studies, HoCCI provides several strong technical chapters. Bob Sheldon's Windows section (ch. 7) is excellent, and Ronald van der Knijff's embedded systems essay (ch. 11) explains the cutting edge of digital forensics. His discussions of directly reading FLASH and EEPROM memory, and using power analysis to break passwords, are impressive. I enjoyed Steve Romig's explanation of using Cisco NetFlow logs in ch. 4, and found the descriptions of wireless systems in ch. 10 to be useful.

HoCCI is not without faults. Several chapters seem like product advertisements; EnCase is the focus of ch. 3, while NFR's IDS appears in ch. 5. The network analysis section (ch. 9) repeats the much-quoted myth that TCP sequence numbers count packets; they actually count bytes of application data.

Overall, HoCCI is a useful supplement to Foundstone's "Incident Response." HoCCI may spend too many pages describing how to search hard drives for remnants of illicit images, illegal software, or harassing emails. Fortunately, its technical content distinguishes it from "Computer Forensics" by Kruse and Heiser and "Incident Response: A Strategic Guide" by Schultz and Shumway.
8 of 8 people found the following review helpful
HASH(0xa019bc24) out of 5 stars Essays by a variety of learned and experienced authors 12 July 2002
By Midwest Book Review - Published on
Format: Paperback
Capably edited by Eoghan Casey (System Security Administrator, Yale University), Handbook Of Computer Crime Investigation: Forensic Tools And Technology is a fascinating guide to the software and hardware tools necessary for collecting digital evidence of cyber crimes ranging from cyberstalking and child pornography to financial fraud, espionage, or terrorism. Essays by a variety of learned and experienced authors present the latest means of forensic analysis for Windows, Unix, and more systems. Sample code, charts, and appropriate case examples pepper this amazing, cutting-edge criminology reference. Handbook Of Computer Crime Investigation is an invaluable and "user friendly" contribution to the field of computer and Internet security.
7 of 7 people found the following review helpful
HASH(0xa019bc90) out of 5 stars A step on.. 8 Aug. 2002
By J. C. Westcott - Published on
Format: Paperback
The 'Handbook of Computer Crime Investigation' follows on well from Eoghan Casey's previous title, 'Digital Evidence and Computer Crime' which I found to be a sound introduction to the subject. This latest book is targeted at those already proficient in Computer Forensics and provides in depth detail of techniques essential to any computer related investigation. Also included are sections specific to examining various operating systems. As someone who both works in information security and has a particular interest in computer forensics I can thoroughly recommend this book!
2 of 2 people found the following review helpful
HASH(0xa0304648) out of 5 stars Hands-on, immediately applicable to our real-world cases 24 Oct. 2005
By Jeff T. Parker - Published on
Format: Paperback
Eoghan Casey's text is immediately useful. It's not theory, it's practical. It's not biased to one operating system, but covers several technologies. Finally, Eoghan and the book's contributors do not gloss over today's most offensive topics, they address them with vigor and solutions.

I would share one concern: the chapter-long product/vendor discussion. Some reviewers label it marketing; other reviewers don't mention it at all. I'll just forewarn you that you will learn much more about EnCase or NFR than about their competitors.

As a security consultant for Hewlett-Packard, it seems my bookshelf fills up entirely too easily, especially as of the last few years. Therefore, I've gotten fairly selective with new book purchases (until I can get a new bookshelf). However, Casey's text is DEFINITELY worth getting - worth knocking another book off to make room. :)

I hope you enjoy this comprehensive text at least half as much as I do.
Were these reviews helpful? Let us know