Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Main Campus: 215-751-8394 | NERC Learning Commons: 215-972-6270 | NWRC Library: 215-496-6019 | WERC Learning Commons: 267-299-5848
Books in the CCP Library
Computer Forensics and Digital Evidence by
Call Number: Main Campus Library 363.25968 L872c 2017
Publication Date: 2017
Computer Forensics and Digital Evidence explains the relevance of computer forensics within investigations related to crimes which involve technological support. The paramount importance that technological innovations have gained in people's lives is a signal of the necessity to acquire knowledge about them. This statement must be considered in regards to crime investigations, where an unlawful act could damage lives and rights. Experts in this area are constantly asked to improve their competence in regards to technological data collection, analysis, and conservation due to the difficulty to preserve them as a reliable proof in the Court. Although many difficulties still cause flaws within computer forensic investigations, the development of this branch of knowledge is increasing every day. This publication gives a detailed account of computer forensics from a scientific and legal point of view. Dissertation. [Subject: Criminology, Computer Forensics]
The Basics of Digital Forensics by
Call Number: Main Campus Library, 363.25968 S189b 2012
Publication Date: 2012
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations. This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available. This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.
The Evolution of Cyber War: International Norms for Emerging-Technology Weapons by Former secretary of defense Leon Panetta once described cyber warfare as "the most serious threat in the twenty-first century," capable of destroying our entire infrastructure and crippling the nation. Already, major cyber attacks have affected countries around the world: Estonia in 2007, Georgia in 2008, Iran in 2010, and most recently the United States. As with other methods of war, cyber technology can be used not only against military forces and facilities but also against civilian targets. Information technology has enabled a new method of warfare that is proving extremely difficult to combat, let alone defeat. And yet cyber warfare is still in its infancy, with innumerable possibilities and contingencies for how such conflicts may play out in the coming decades. Brian M. Mazanec examines the worldwide development of constraining norms for cyber war and predicts how those norms will unfold in the future. Employing case studies of other emerging-technology weapons--chemical and biological, strategic bombing, and nuclear weaponry--Mazanec expands previous understandings of norm-evolution theory, offering recommendations for U.S. policymakers and citizens alike as they grapple with the reality of cyber terrorism in our own backyard.
Call Number: Main Library, 1st Floor 341.63 M475e 2015
Publication Date: 2015
Black Code: Surveillance, Privacy, and the Dark Side of the Internet by Drawing on the first-hand experiences of one of the most important protagonists in the battle - the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks worldwide - Black Code takes readers on a fascinating journey into the battle. Thought-provoking, compelling and sometimes frightening, it is a wake-up call to those who have come to take the Internet for granted. Cyberspace is ours and is what we make of it, Deibert argues.
Call Number: Main Library, 1st Floor 303.4833 D324b 2013
Publication Date: 2013
Computer Network Security and Cyber Ethics by In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions of morality and ethics. The reader will gain an understanding of how the security of information in general and of computer networks in particular, on which our national critical infrastructure and, indeed, our lives depend, is based squarely on the individuals who build the hardware and design and develop the software that run the networks that store our vital information. Addressing security issues with ever-growing social networks are two new chapters: Security of Mobile Systems and Security in the Cloud Infrastructure. Instructors considering this book for use in a course may request an examination copy here.
Call Number: Main Library, 1st Floor 005.8 K62c 2014
Publication Date: 2014
Articles and Websites
6 Skills Required For A Career In Digital Forensics [Forbes, April 29, 2017]
Tech meets criminal justice in the field of digital forensics--a branch of forensic science dealing with recovering and analyzing information from data storage devices (including computers, phones, networks, and more).
CSI: Walmart [The Atlantic, April 3, 2017]
Some of the best digital-forensics labs don't belong to the police—they're run by banks, tech companies, and retailers.
Digital forensics: from the crime lab to the library [Nature, May 30, 2016]
Archivists are borrowing and adapting techniques used in criminal investigations to access data and files created in now-obsolete systems.
Digital Forensics: How Experts Uncover Doctored Images [Scientific American, June 2008]
Modern software has made manipulation of photographs easier to carry out and harder to uncover than ever before, but the technology also enables new methods of detecting doctored images
Official websites and organizations:
= .gov website