£41.99
  • RRP: £48.99
  • You Save: £7.00 (14%)
FREE Delivery in the UK.
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Quantity:1
Digital Forensics Process... has been added to your Basket
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements Paperback – 28 Oct 2013

5.0 out of 5 stars 3 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
£41.99
£35.15 £42.02
£41.99 FREE Delivery in the UK. Only 2 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.
click to open popover

Special Offers and Product Promotions


Frequently Bought Together

  • Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
  • +
  • Computer Forensics and Digital Investigation with EnCase Forensic v7
Total price: £66.03
Buy the selected items together

Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.




Product details

  • Paperback: 880 pages
  • Publisher: Syngress (28 Oct. 2013)
  • Language: English
  • ISBN-10: 1597497428
  • ISBN-13: 978-1597497428
  • Product Dimensions: 21.6 x 4.6 x 28 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Bestsellers Rank: 430,094 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

Review

"With this book you have a finely detailed chart guiding you through every aspect of creating, using and documenting processes that will make you compliant with both the formal accreditation standards and less formal, but no less important, industry best practices…if you are running – or plan to run – a digital forensics business, then this will provide a template for everything you do."--Network Security, May 2014 "It is clear that the authors bring real-world experience to the book, covering the whole life cycle of digital forensics investigations, gathering evidence, and chain of custody results…it will be a very useful handbook for future experts, especially those charged with setting up a forensic laboratory or those seeking accreditation and certification of an existing laboratory."--ComputingReviews.com, February 19, 2014 "…this volume on digital forensics and investigation provides information on best practices for meeting regulatory requirements and gaining and maintaining certifications and accreditation within the digital forensics field. The work is divided into three sections covering initial policies and procedures for setting up a laboratory, operating procedures and continuing policies, and accreditation standards and requirements."--ProtoView.com, February 2014 "What the book does do is provide a comprehensive and all-inclusive set of details that covers the entire lifecycle of a digital forensics investigation, ensuing evidence gathered, and chain of custody that results…Authors David Lilburn Watson and Andrew Jones bring decades of detailed real-world experience to the book, which readers are certain to find to be a unique reference."--RSAConference.com, December 16, 2013

About the Author

David Lilburn Watson heads up Forensic Computing Ltd, a specialist forensic recovery and investigation company. He is responsible for the coordination and efficient delivery of the computer forensic and electronic evidence recovery services, digital investigations, and provides support for a broad range of investigative, security and risk consulting assignments. He is a Certified Fraud Examiner (CFE) and a Certified Information Forensic Investigator (CIFI), a Certified Computer Crime Investigator (CCCI), an Advanced Certified Computer Forensics Technician (CCFT). In addition to specialised forensic certifications he is a Certified Information Security Systems Professional (CISSP), a Certified Information Systems Manager (CISM) and a Certified Information Systems Auditor (CISA). David has also led Forensic Computing Ltd to ISO 27001 and ISO 9001 certification, making FCL one of very few consultancies to hold such important credentials in the field of forensic services.

After 25 years service with the British Army’s Intelligence Corps, Andy Jones became a business manager and a researcher and analyst in the area of Information Warfare and computer crime at a defence research establishment. In Sept 2002, on completion of a paper on a method for the metrication of the threats to information systems, he left the defence environment to take up a post as a principal lecturer at the University of Glamorgan in the subjects of Network Security and Computer Crime and as a researcher on the Threats to Information Systems and Computer Forensics. At the university he developed and managed a well equipped Computer Forensics Laboratory and took the lead on a large number of computer investigations and data recovery tasks. He holds a Ph.D. in the area of threats to information systems. In January 2005 he joined the Security Research Centre at BT where he became a Chief Researcher and the head of information. Andy now holds a post as a visiting Professor at Edith Cowan University in Perth, Australia and he is currently the Programme Chair for the M.Sc. in Information Security at Khalifa University in Sharjah, UAE.


Customer Reviews

5.0 out of 5 stars
5 star
3
4 star
0
3 star
0
2 star
0
1 star
0
See all 3 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Kindle Edition Verified Purchase
Meets the expectations, and surpasses them. Superb book.

Very clear, easy to follow and has all we need in order to write the policies. Superb examples, well explained.

If you just started with ISO27001 and need examples of policies, this is the only book you need.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book covers everything in a clear and concise manner. It covers in detail setting up the laboratory, risk management, end to end case management, and plenty more. There are step by step breakdowns of processes and lots of real world examples of genuine situations (e.g. handling of equipment powered on or powered off on arrival).

But what I really like is how straight to the point this book is. There is such a vast quantity of information, but finding what I need to know is simple. Thoroughly recommended.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
The considerable experience and knowledge of the authors is evident in the content of this long overdue book, which will no doubt become the standard reference material for this specialist subject. With their respective backgrounds in forensics, intelligence, investigations and policy, the authors have created a thorough and extensive manual detailing best practice and legal and policy compliance, in the investigation, management and governance of computer forensic seizures and examinations. The book details the correct steps in the creation of the forensic laboratory environment, and progresses through the search and seizure, investigation, and evidential submission stages, whilst highlighting the requirements for the maintenance of evidential integrity and policy compliance throughout the processes. The check lists in the appendices provide a very useful aide-mémoire for investigators and managers. Every conceivable issue both electronic and human elements, that might arise in the formation and development of a forensic laboratory are addressed with concise guidance, further reference sources and supported by policy templates. Any organisation or individual concerned in the field of computer forensic investigations would substantially benefit from consulting this book. Additionally anyone considering establishing, or currently operating, a computer forensic laboratory would find this essential reference material, especially if seeking formal accreditation for their facilities. An excellent reference manual.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x92c0a4ec) out of 5 stars 3 reviews
4 of 4 people found the following review helpful
HASH(0x92e6b9a8) out of 5 stars Invaluable resource to ensure a forensic investigation is done correctly 16 Dec. 2013
By Ben Rothke - Published on Amazon.com
Format: Paperback
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

When it comes to a digital forensics investigation, process is crucial. If certain steps are skipped or done incorrectly, a saavy defense attorney can have the evidence thrown out.

With that, no one will mistake Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements for a Tom Clancy novel. While books from Clancy are page turners, Digital Forensics Processing and Procedures is not a book that is necessarily going to be read from cover to cover in the same way.

What the book does do is provide a comprehensive and all-inclusive set of details that covers the entire lifecycle of a digital forensics investigation, ensuing evidence gathered, and chain of custody that results.

In these investigations, all it takes is one misstep to have hundreds of hours of log analysis discarded. A book like this can ensure that trivial mistakes which can undermine an investigation don’t occur.

The web site for the book was not up at the time this review was written.

Authors David Lilburn Watson and Andrew Jones bring decades of detailed real-world experience to the book, which readers are certain to find to be a unique reference.

For those who want to ensure that their digital forensic program follows best practices and accepted industry methods, Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements will prove to be an invaluable resource.
Invaluable resource to ensure a forensic investigation is done correctly
2 of 4 people found the following review helpful
HASH(0x92e6ba08) out of 5 stars require correct URL or link to download the free templates 6 Nov. 2013
By Sazali Musa - Published on Amazon.com
Format: Paperback
It is one of a kind we would say...with good comparisons & huge collection of references. The only matter is that, still could not find the right link to download the templates and relevant appendices. Eventhough in the Preface paragraph stated "....will contain the most up-to-date material: [...] - none of them listed, other than that where else we could find those materials...
HASH(0x92b6d288) out of 5 stars Four Stars 26 July 2014
By Narasimha Rao - Published on Amazon.com
Format: Kindle Edition Verified Purchase
Nice insight
Were these reviews helpful? Let us know


Feedback