![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKhEIDZ9y3PeX36qweslF3GhmXYKHM__NkATnEEQRDZh2wbYGA7P-BjiyaAkn6-kZbT1VZ9Oy4PDYJ9D2lh_VF0RvW6xCKzuVOsALbynAy3Sgk0UUqlTwD3ScAeUekHiUclEapD-NhEiiz/s320/CHFI+1.jpg)
Chapter 1, Computer
Forensics in Today’s World, discusses some of the
most important problems and concerns forensic investigators face today
including objectives and methodologies used in computer forensics.
Chapter 2, Computer
Forensic Lab, describes the physical security needs of a
lab and recommends how to maintain security.
Chapter 3, Computer
Investigation Process, introduces the concept of
computer investigation and shows the steps involved in investigating computer
crime.
Chapter 4, First
Responder Procedures, explains the role of the first responder,
how to build a first responder tool-kit and how to avoid some common mistakes
often made by first responders.
Chapter 5, Incident
Handling, discusses how to react to various incidents
including system crashes, packet flooding, and unauthorized use of another user’s
account.
Chapter 6, Investigative
Reports, focuses on different investigative reports
and how to make sure the report is well-written for use in possible legal
matters.
TABLE OF CONTENTS
PREFACE
CHAPTER 1
Computer Forensics in Today’s World
CHAPTER 2
Computer Forensics Lab
CHAPTER 3
Computer Investigation Process
CHAPTER 4
First Responder Procedures
CHAPTER 5
Incident Handling
CHAPTER 6
Investigative Report
INDEX