Home :: Books :: Nonfiction  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction

Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Computer Forensics and Privacy

Computer Forensics and Privacy

List Price: $90.00
Your Price: $90.00
Product Info Reviews

<< 1 >>

Rating: 3 stars
Summary: Great reference but grammer and correctness needs work.
Review: This book is a great reference. I think that it is geared more towards the counter-forensics rather than forensic. That did not change my mind on how great a reference it is. This book shows me where to look and how to obtain the information I want.

The links are another story. I understand that some links change but there are a lot of grammatical mistakes and link mispell errors. I think an errata needs to accompany this book - just a suggestion.

Rating: 4 stars
Summary: Good book w/ a few holes
Review: This book occupies a unique place in the literature of computer
forensics. Most works in the field, such as Kruse and Heiser's
"Computer Forensics" (cf. BKCMPFRN.RVW), concentrate on documentation
of the investigation with a view to presentation in court. The actual
mechanics of data recovery tend to be left to commercial tools.
Caloyannides demonstrates how to delve into corners of the computer in
order to actually get the data out.

At the same time, this work is inconsistent, on at least two levels.
The perspective flips back and forth between forensics and privacy,
alternately emphasizing how to find evidence, and how to hide
evidence. The technology involved is the same, but the shifts in
viewpoint can be jarring to the reader. At the same time, the depth
of technical detail can vary wildly. At one point the book stops shy
of telling you how to undelete files with a sector editor (an activity
that could be useful to every computer user), while other sections
list lengthy and extraordinary measures to secure personal computers.

Part one concentrates on the data recovery aspect of computer
forensics. Chapter one is entitled an introduction, but seems to be
more of an editorial on privacy, with the added statement that the
book is intended both for law enforcement personnel needing details of
computer forensic techniques and those wishing to preserve the privacy
of data. The use of, and factors related to the use of, computer
forensics is supported by specific cases (rather than vague
suppositions) in chapter two. One has to agree with the author's
statement, in chapter three, that "computer forensics can be done--
and, sadly, is often done--by persons with a minimal amount of either
education or experience." Therefore it is unfortunate that the
forensic tools list and book structure are both difficult at this
point, although there is good material and writing, and Caloyannides
is not afraid to tackle the social and political aspects of the field.
Chapter four outlines various places (primarily in Windows) from which
data may be recovered. It is an odd mix of little known and very
valuable information, and extremely poor explanations of basic
functions like manual undeletion and file overwriting. A strange and
terse look at steganography, US and UK surveillance systems,
cryptography, and anonymity makes up chapter five. Data acquisition,
from sources such as key logging and Van Eck radiation, is reviewed in
chapter six. Chapter seven debunks a short list of measures falsely
believed to provide privacy protection.

Part two turns to privacy and security. Chapter eight is a discussion
of legal and commercial protections of privacy (mostly in the US) and
their failings. Installing and configuring a privacy protected
configuration of Windows is covered in chapter nine, in considerable
detail. Chapter ten's review of basic online privacy is heavy on
additional software packages. Intermediate online privacy, in chapter
eleven, looks at browser and email configurations, more packages, and
has a section on tracing email that would be helpful in dealing with
spam. (An unfortunate typesetting error seems to have deleted what
might have been valuable information about PGP [Pretty Good Privacy].)
Chapter twelve is more advanced, dealing with anonymizing services and
personal firewalls, but may be beyond the average user. A general
opinion piece on cryptography, chapter thirteen nevertheless provides
a good, basic background, albeit with a social and political emphasis.
Chapter fourteen looks at more practical encryption, detailing PGP and
specialized cryptographic programs, with a detour into biometrics.

Part three is a brief look at legal and other issues. Chapter fifteen
is a brief look at laws, mostly in the US. Chapter sixteen touches on
security aspects of VoIP (Voice over Internet Protocol) and GSM
(Global System for Mobility) wireless services.

Despite the ragged organization and style, and some glaring gaps in
coverage, this book does contain a wealth of information for both the
computer forensic examiner, and the user concerned with privacy. For
anyone beyond the most basic user it is well worth a read.

Rating: 4 stars
Summary: Good book w/ a few holes
Review: This book occupies a unique place in the literature of computer
forensics. Most works in the field, such as Kruse and Heiser's
"Computer Forensics" (cf. BKCMPFRN.RVW), concentrate on documentation
of the investigation with a view to presentation in court. The actual
mechanics of data recovery tend to be left to commercial tools.
Caloyannides demonstrates how to delve into corners of the computer in
order to actually get the data out.

At the same time, this work is inconsistent, on at least two levels.
The perspective flips back and forth between forensics and privacy,
alternately emphasizing how to find evidence, and how to hide
evidence. The technology involved is the same, but the shifts in
viewpoint can be jarring to the reader. At the same time, the depth
of technical detail can vary wildly. At one point the book stops shy
of telling you how to undelete files with a sector editor (an activity
that could be useful to every computer user), while other sections
list lengthy and extraordinary measures to secure personal computers.

Part one concentrates on the data recovery aspect of computer
forensics. Chapter one is entitled an introduction, but seems to be
more of an editorial on privacy, with the added statement that the
book is intended both for law enforcement personnel needing details of
computer forensic techniques and those wishing to preserve the privacy
of data. The use of, and factors related to the use of, computer
forensics is supported by specific cases (rather than vague
suppositions) in chapter two. One has to agree with the author's
statement, in chapter three, that "computer forensics can be done--
and, sadly, is often done--by persons with a minimal amount of either
education or experience." Therefore it is unfortunate that the
forensic tools list and book structure are both difficult at this
point, although there is good material and writing, and Caloyannides
is not afraid to tackle the social and political aspects of the field.
Chapter four outlines various places (primarily in Windows) from which
data may be recovered. It is an odd mix of little known and very
valuable information, and extremely poor explanations of basic
functions like manual undeletion and file overwriting. A strange and
terse look at steganography, US and UK surveillance systems,
cryptography, and anonymity makes up chapter five. Data acquisition,
from sources such as key logging and Van Eck radiation, is reviewed in
chapter six. Chapter seven debunks a short list of measures falsely
believed to provide privacy protection.

Part two turns to privacy and security. Chapter eight is a discussion
of legal and commercial protections of privacy (mostly in the US) and
their failings. Installing and configuring a privacy protected
configuration of Windows is covered in chapter nine, in considerable
detail. Chapter ten's review of basic online privacy is heavy on
additional software packages. Intermediate online privacy, in chapter
eleven, looks at browser and email configurations, more packages, and
has a section on tracing email that would be helpful in dealing with
spam. (An unfortunate typesetting error seems to have deleted what
might have been valuable information about PGP [Pretty Good Privacy].)
Chapter twelve is more advanced, dealing with anonymizing services and
personal firewalls, but may be beyond the average user. A general
opinion piece on cryptography, chapter thirteen nevertheless provides
a good, basic background, albeit with a social and political emphasis.
Chapter fourteen looks at more practical encryption, detailing PGP and
specialized cryptographic programs, with a detour into biometrics.

Part three is a brief look at legal and other issues. Chapter fifteen
is a brief look at laws, mostly in the US. Chapter sixteen touches on
security aspects of VoIP (Voice over Internet Protocol) and GSM
(Global System for Mobility) wireless services.

Despite the ragged organization and style, and some glaring gaps in
coverage, this book does contain a wealth of information for both the
computer forensic examiner, and the user concerned with privacy. For
anyone beyond the most basic user it is well worth a read.

Rating: 5 stars
Summary: A long overdue practical and readable book on privacy.
Review: This is a long overdue book. It is readable, gives specific practical advice on online and offline computer privacy, and does not mince words.
With book in hand, I found numerous holes in my own setup which I promptly closed. This book is a bible in its field.

Rating: 5 stars
Summary: Pleasantly Surprised
Review: Very well written. Showed a different side to Computer Forensics that I had not considered. All my research has been on the side of the Computer Forensic Investigator and not on the issues of citizens rights to keep data private from Computer Forensic Hackers. Of the 25 books on Securtiy/Encryption/Forenscis purchased by myself this is the most unbiased and informative.


<< 1 >>

© 2004, ReviewFocus or its affiliates