{"id":8999,"date":"2025-11-26T14:24:35","date_gmt":"2025-11-26T20:24:35","guid":{"rendered":"https:\/\/idsinc.com\/publication\/federal-judges-guide-to-discovery-edition-3-0-copy\/"},"modified":"2025-11-26T14:32:13","modified_gmt":"2025-11-26T20:32:13","slug":"computer-forensics","status":"publish","type":"publications","link":"https:\/\/idsinc.com\/en_gb\/publication\/computer-forensics\/","title":{"rendered":"Computer Forensics: Incident Response Essentials 1st Edition"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\"><strong>by <a href=\"https:\/\/idsinc.com\/en_gb\/team\/warren-kruse\/\" target=\"_blank\" rel=\"noreferrer noopener\">Warren G. Kruse II<\/a> and <a href=\"https:\/\/www.amazon.com\/s\/ref=dp_byline_sr_book_2?ie=UTF8&amp;field-author=Jay+G.+Heiser&amp;text=Jay+G.+Heiser&amp;sort=relevancerank&amp;search-alias=books\">Jay G. Heiser<\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background\" style=\"background-color:#f1f1f1;color:#f1f1f1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">Every computer crime leaves tracks\u2014you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.amazon.com\/Computer-Forensics-Incident-Response-Essentials\/dp\/0201707195#:~:text=Written%20by%20two%20experts%20in,evidence%20through%20the%20final%20report\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Get Your Copy<\/strong><\/a><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>by Warren G. Kruse II and Jay G. Heiser Every computer crime leaves tracks\u2014you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":8969,"parent":0,"menu_order":0,"template":"","categories":[23,20],"tags":[],"publication_category":[28,25],"class_list":["post-8999","publications","type-publications","status-publish","has-post-thumbnail","hentry","category-books","category-publications","publication_category-all-publications","publication_category-books","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Computer Forensics: Incident Response Essentials 1st Edition - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/publication\/computer-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Forensics: Incident Response Essentials 1st Edition\" \/>\n<meta property=\"og:description\" content=\"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/publication\/computer-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T20:32:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1103\" \/>\n\t<meta property=\"og:image:height\" content=\"1360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/\",\"name\":\"Computer Forensics: Incident Response Essentials 1st Edition - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Computer-Forensics.jpg\",\"datePublished\":\"2025-11-26T20:24:35+00:00\",\"dateModified\":\"2025-11-26T20:32:13+00:00\",\"description\":\"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Computer-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Computer-Forensics.jpg\",\"width\":1103,\"height\":1360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/computer-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\",\"item\":\"https:\\\/\\\/idsinc.com\\\/publication\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Computer Forensics: Incident Response Essentials 1st Edition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Computer Forensics: Incident Response Essentials 1st Edition - iDiscovery Solutions","description":"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/publication\/computer-forensics\/","og_locale":"en_GB","og_type":"article","og_title":"Computer Forensics: Incident Response Essentials 1st Edition","og_description":"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.","og_url":"https:\/\/idsinc.com\/en_gb\/publication\/computer-forensics\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2025-11-26T20:32:13+00:00","og_image":[{"width":1103,"height":1360,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/","url":"https:\/\/idsinc.com\/publication\/computer-forensics\/","name":"Computer Forensics: Incident Response Essentials 1st Edition - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","datePublished":"2025-11-26T20:24:35+00:00","dateModified":"2025-11-26T20:32:13+00:00","description":"Every computer crime leaves tracks\u2014you just have to know where to look. This is how to collect and analyze evidence in a digital crime scene.","breadcrumb":{"@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/publication\/computer-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","width":1103,"height":1360},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/publication\/computer-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Publications","item":"https:\/\/idsinc.com\/publication\/"},{"@type":"ListItem","position":3,"name":"Computer Forensics: Incident Response Essentials 1st Edition"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"ptb_metabox":[],"ptb_taxonomy":{"category":[{"term_id":23,"name":"Books","slug":"books","term_group":0,"term_taxonomy_id":23,"taxonomy":"category","description":"","parent":20,"count":5,"filter":"raw"},{"term_id":20,"name":"Publications","slug":"publications","term_group":0,"term_taxonomy_id":20,"taxonomy":"category","description":"","parent":0,"count":11,"filter":"raw"}],"publication_category":[{"term_id":28,"name":"All Publications","slug":"all-publications","term_group":0,"term_taxonomy_id":28,"taxonomy":"publication_category","description":"","parent":0,"count":11,"filter":"raw"},{"term_id":25,"name":"Books","slug":"books","term_group":0,"term_taxonomy_id":25,"taxonomy":"publication_category","description":"","parent":0,"count":6,"filter":"raw"}]},"ptb_featured_image":{"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg","title":"Computer Forensics: Incident Response Essentials","caption":""},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/publications\/8999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/publications"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/publications"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/8969"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=8999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=8999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=8999"},{"taxonomy":"publication_category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/publication_category?post=8999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}