Guide to Computer Forensics and Investigations, Second Edition

Product Description
This text offers a disciplined approach to implementing a comprehensive accident-response plan with a focus on being able to detect intruders, discover what damage they did and discover their identities…. More >>

Guide to Computer Forensics and Investigations, Second Edition

5 replies
  1. lobster meat says:

    The last review isn’t worth a penny. Take it from a forensics expert, this book explains everything about forensics and includes the tools used and scenerios to follow. Every case in this book is very similiar to the cases that I work on a daily basis. Bought the book for our high tech crimes office and use it as a learning guide. It will take the reader through different scenerios and expect the reader to use tools provided, or easily downloaded. This is the book for anybody interested in learning computer forensics. There is a lot of hands on, which is necessary to be successful in learning forensics.
    Rating: 5 / 5

  2. forensic novice says:

    I am a complete novice at computer forensics (CF). I am taking a technical college course in CF for which this was the required textbook as I write this. I wrote this review so Amazon would stop pestering me with emails asking me to write this review. I haven’t finished the course or the book yet but in the absence of any other reviews maybe my experience will help others.

    So far I am through chapter 5. The book seems pretty good except for a couple of minor issues. Many CF software such as Drivespy requires commands entered from the DOS command line. The way the DOS commands are printed in the book it can be hard to tell where spaces are required in a given command, with the result that sometimes we were unable to type the commands correctly, which meant that the commands would not execute. It took us some experimenting to figure out the correct command, since like many computer users, we are not that familiar with DOS anymore.

    Also, there is a sample problem in chapter 4 I believe involving processing a disk to recover information supplied by the writers of the book about whether a fictitious employee was operating a business on company time. The information we recovered was supposed to confirm that the employee was doing so, but the information we actually recovered indicated that he was not, so we aren’t sure what that was supposed to mean.

    My course instructor was very enthusiastic about this book, but she is a novice at instructing CF courses as well. I hope that this helps anyone interested in the book and stops Amazon from sending me those emails. When I finish the course I will try to post a further review.
    Rating: 3 / 5

  3. Christopher W. Brown says:

    There simply has to be better than this.

    The package came without the CD. The text was very limited in useful and relevant material.

    I used this text for a very good college course in computer forensics. Fortunately, the instructor was incredible. The text was used very little because it was difficult to navigate and not very relevant to the practical approach to computer forensics. Primarily, it was used as a reference guide for file systems and law.

    Rating: 1 / 5

  4. W. Simmons says:

    This book was used for an intermediate forensics course and it was a terrible combination. I don’t know if the authors bothered to validate their procedures with the tools, but neither worked well. We spent almost as much time trying to get the tools to work as we did actually performing investigations. Not only that, but the answers to some of the problems were incorrect. Bad choice of textbook for a college course !
    Rating: 1 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.