EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Digital Image Forensics

Download or read book Digital Image Forensics written by Husrev Taha Sencar and published by Springer Science & Business Media. This book was released on 2012-08-01 with total page 369 pages. Available in PDF, EPUB and Kindle. Book excerpt: Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical evidence, just as they have become our primary source of news and have replaced paper-based financial documentation. Crucially, the contributions also analyze the very profound problems which have arisen alongside the digital image, issues of veracity and progeny that demand systematic and detailed response: It looks real, but is it? What camera captured it? Has it been doctored or subtly altered? Attempting to provide answers to these slippery issues, the book covers how digital images are created, processed and stored before moving on to set out the latest techniques for forensically examining images, and finally addressing practical issues such as courtroom admissibility. In an environment where even novice users can alter digital media, this authoritative publication will do much so stabilize public trust in these real, yet vastly flexible, images of the world around us.

Book Photo Forensics

    Book Details:
  • Author : Hany Farid
  • Publisher : MIT Press
  • Release : 2016-11-04
  • ISBN : 0262035340
  • Pages : 337 pages

Download or read book Photo Forensics written by Hany Farid and published by MIT Press. This book was released on 2016-11-04 with total page 337 pages. Available in PDF, EPUB and Kindle. Book excerpt: The first comprehensive and detailed presentation of techniques for authenticating digital images. Photographs have been doctored since photography was invented. Dictators have erased people from photographs and from history. Politicians have manipulated photos for short-term political gain. Altering photographs in the predigital era required time-consuming darkroom work. Today, powerful and low-cost digital technology makes it relatively easy to alter digital images, and the resulting fakes are difficult to detect. The field of photo forensics—pioneered in Hany Farid's lab at Dartmouth College—restores some trust to photography. In this book, Farid describes techniques that can be used to authenticate photos. He provides the intuition and background as well as the mathematical and algorithmic details needed to understand, implement, and utilize a variety of photo forensic techniques. Farid traces the entire imaging pipeline. He begins with the physics and geometry of the interaction of light with the physical world, proceeds through the way light passes through a camera lens, the conversion of light to pixel values in the electronic sensor, the packaging of the pixel values into a digital image file, and the pixel-level artifacts introduced by photo-editing software. Modeling the path of light during image creation reveals physical, geometric, and statistical regularities that are disrupted during the creation of a fake. Various forensic techniques exploit these irregularities to detect traces of tampering. A chapter of case studies examines the authenticity of viral video and famously questionable photographs including “Golden Eagle Snatches Kid” and the Lee Harvey Oswald backyard photo.

Book Forensic Digital Image Processing

Download or read book Forensic Digital Image Processing written by Brian Dalrymple and published by CRC Press. This book was released on 2018-03-20 with total page 299 pages. Available in PDF, EPUB and Kindle. Book excerpt: The digital revolution over the past several decades has advanced every facet of evidence detection, photography, optimization, and interpretation. Forensic scientists and practitioners have benefited tremendously from the move from film to digital. With proper procedures in place, digital images and casework capabilities have increased tremendously in both complexity and range due to a vast array of tools to enhance evidence and photography. Forensic Digital Image Processing: Optimization of Impression Evidence provides the forensic investigator with the tools and understanding to extract, optimize, and interpret the maximum evidence possible from crime scenes to increase identifications. The book begins by examining the emergence of forensic digital image processing, and the gradual improvement and acceptance of the science over the past four decades. Coverage includes looking at the issues of image integrity and authentication including forensic image optimization and the manipulation of images. Chapters explore techniques exploiting color theory, modes, and channels to optimize signal-to-noise ratio in images. One of the greatest assets of digital image technology is the ability to combine multiple images of the same subject to create a final, blended image: one that displays the desired evidence and is especially useful for fingerprint or footwear impression. Later chapters demonstrate image subtraction, focus stacking, and high dynamic range, utilizing images in optimum focus and with substrate interference diminished or removed entirely. The authors look at fast Fourier transform as an optimal tool for noise removal, addressing basic theory and diagnosis of the noise signatures. The book discusses the history of digital imaging techniques and their treatment within the court system. Forensic Digital Image Processing: Optimization of Impression Evidence serves as an invaluable resource and tool for practicing professionals–as well as those new to the field—to look at best practices, the latest technology, and advances in utilizing the increasing array of tools of the trade.

Book Forensic Digital Imaging and Photography

Download or read book Forensic Digital Imaging and Photography written by Herbert L. Blitzer and published by Academic Press. This book was released on 2002-01-24 with total page 280 pages. Available in PDF, EPUB and Kindle. Book excerpt: "This hands-on guide clarifies the difference between what can be done digitally and what should be done in a forensic setting, and helps the reader "learn by doing" with exercises and step-by-step instructions. The images and exercises in the CD-ROM provide practical examples of the techniques described in the book." "Law enforcement professionals who follow the recommendations in this text can feel confident that their handling of imaging evidence will stand up to the high standards necessary for prosecuting criminal cases."--BOOK JACKET.

Book Digital Image Forensics

Download or read book Digital Image Forensics written by Aniket Roy and published by Springer. This book was released on 2019-05-13 with total page 89 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.

Book Understanding Forensic Digital Imaging

Download or read book Understanding Forensic Digital Imaging written by Herbert L. Blitzer and published by Academic Press. This book was released on 2010-07-26 with total page 403 pages. Available in PDF, EPUB and Kindle. Book excerpt: Understanding Forensic Digital Imaging offers the principles of forensic digital imaging and photography in a manner that is straightforward and easy to digest for the professional and student. It provides information on how to photograph any setting that may have forensic value, details how to follow practices that are acceptable in court, and recommends what variety of hardware and software are most valuable to a practitioner. In addition to chapters on basic topics such as light and lenses, resolution, and file formats, the book contains forensic-science-specific information on SWGIT and the use of photography in investigations and in court. Of particular note is Chapter 17, Establishing Quality Requirements, which offers information on how to create a good digital image, and is more comprehensive than any other source currently available. Covers topics that are of vital importance to the practicing professional Serves as an up-to-date reference in the rapidly evolving world of digital imaging Uses clear and concise language so that any reader can understand the technology and science behind digital imaging

Book Practical Forensic Imaging

Download or read book Practical Forensic Imaging written by Bruce Nikkel and published by No Starch Press. This book was released on 2016-09-01 with total page 322 pages. Available in PDF, EPUB and Kindle. Book excerpt: Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks. Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media. You’ll learn how to: –Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies –Protect attached evidence media from accidental modification –Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal –Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping –Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt –Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others –Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

Book Digital Forensics with Open Source Tools

Download or read book Digital Forensics with Open Source Tools written by Harlan Carvey and published by Elsevier. This book was released on 2011-03-29 with total page 289 pages. Available in PDF, EPUB and Kindle. Book excerpt: Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies. Written by world-renowned forensic practitioners Details core concepts and techniques of forensic file system analysis Covers analysis of artifacts from the Windows, Mac, and Linux operating systems

Book Photoshop CS3 for Forensics Professionals

Download or read book Photoshop CS3 for Forensics Professionals written by George Reis and published by John Wiley & Sons. This book was released on 2007-10-08 with total page 290 pages. Available in PDF, EPUB and Kindle. Book excerpt: Digital imaging technology has been used in forensics since at least 1992, yet until now there?has been?no practical instruction available to address the unique issues of image processing in an everyday forensic environment. Photoshop CS3 for Forensics Professionals serves the everyday, real-world needs of law enforcement and legal personnel dealing with digital images (including both photos and video stills). This book is an excellent tool for: Law enforcement personnel, from crime scene and arson investigators, detectives, and patrol officers to forensic photographers, fingerprint examiners, video analysts, tool mark and footwear examiners, and criminalists. Security pros in such fields as private investigation, insurance, fraud detection, and loss prevention. Scientific and technical users of Photoshop with workflows similar to law enforcement, such as medical photographers, research imaging experts, engineering and architecture staff, and industrial photographers. Staff responsible for maintaining a photo archive or printing images for court. Photoshop CS3 for Forensics Professionals is the only book to provide forensics professionals with specific answers to their imaging questions. This is the perfect resource for those who want to move from simple theory to the essential skills needed to be more effective. This resource is dividied into three parts: Part I: The Essentials is about setting up your workflow, archiving your images, and familiarizing yourself with Adobe Photoshop and Adobe Bridge, including the setting up of preferences. Also covered are the best practices in writing reports and providing courtroom testimony. Part II: The Digital Darkroom teaches how to use Photoshop to accomplish what traditionally was done in the darkroom, from correcting color casts to making prints and exhibits for courtroom use. Part III: Image Analysis & Enhancement covers techniques for clarifying images so that details can be better viewed and used for analysis or comparison, from contrast enhancement and pattern removal to even forensic video analysis. The companion CD-ROM provides sample images—including various accident and crime scenes—you can use to practice the techniques from the book while?following along with the tutorials. It also includes several scripts, plug-ins, and actions so you can work more effectively. In addition, instructor's materials are available so you can use book in workshops and training seminars. Order this one-of-a-kind resource today! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Book Digital Forensics with Kali Linux

Download or read book Digital Forensics with Kali Linux written by Shiva V. N. Parasram and published by Packt Publishing Ltd. This book was released on 2017-12-19 with total page 263 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guide About This Book Master powerful Kali Linux tools for digital investigation and analysis Perform evidence acquisition, preservation, and analysis using various tools within Kali Linux Implement the concept of cryptographic hashing and imaging using Kali Linux Perform memory forensics with Volatility and internet forensics with Xplico. Discover the capabilities of professional forensic tools such as Autopsy and DFF (Digital Forensic Framework) used by law enforcement and military personnel alike Who This Book Is For This book is targeted at forensics and digital investigators, security analysts, or any stakeholder interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be an advantage. What You Will Learn Get to grips with the fundamentals of digital forensics and explore best practices Understand the workings of file systems, storage, and data fundamentals Discover incident response procedures and best practices Use DC3DD and Guymager for acquisition and preservation techniques Recover deleted data with Foremost and Scalpel Find evidence of accessed programs and malicious programs using Volatility. Perform network and internet capture analysis with Xplico Carry out professional digital forensics investigations using the DFF and Autopsy automated forensic suites In Detail Kali Linux is a Linux-based distribution used mainly for penetration testing and digital forensics. It has a wide range of tools to help in forensics investigations and incident response mechanisms. You will start by understanding the fundamentals of digital forensics and setting up your Kali Linux environment to perform different investigation practices. The book will delve into the realm of operating systems and the various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also teach you to create forensic images of data and maintain integrity using hashing tools. Next, you will also master some advanced topics such as autopsies and acquiring investigation data from the network, operating system memory, and so on. The book introduces you to powerful tools that will take your forensic abilities and investigations to a professional level, catering for all aspects of full digital forensic investigations from hashing to reporting. By the end of this book, you will have had hands-on experience in implementing all the pillars of digital forensics—acquisition, extraction, analysis, and presentation using Kali Linux tools. Style and approach While covering the best practices of digital forensics investigations, evidence acquisition, preservation, and analysis, this book delivers easy-to-follow practical examples and detailed labs for an easy approach to learning forensics. Following the guidelines within each lab, you can easily practice all readily available forensic tools in Kali Linux, within either a dedicated physical or virtual machine.

Book Python Forensics

    Book Details:
  • Author : Chet Hosmer
  • Publisher : Elsevier
  • Release : 2014-05-19
  • ISBN : 0124186831
  • Pages : 347 pages

Download or read book Python Forensics written by Chet Hosmer and published by Elsevier. This book was released on 2014-05-19 with total page 347 pages. Available in PDF, EPUB and Kindle. Book excerpt: Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to: - Develop new forensic solutions independent of large vendor software release schedules - Participate in an open-source workbench that facilitates direct involvement in the design and implementation of new methods that augment or replace existing tools - Advance your career by creating new solutions along with the construction of cutting-edge automation solutions to solve old problems - Provides hands-on tools, code samples, and detailed instruction and documentation that can be put to use immediately - Discusses how to create a Python forensics workbench - Covers effective forensic searching and indexing using Python - Shows how to use Python to examine mobile device operating systems: iOS, Android, and Windows 8 - Presents complete coverage of how to use Python scripts for network investigation

Book Practical Linux Forensics

Download or read book Practical Linux Forensics written by Bruce Nikkel and published by No Starch Press. This book was released on 2021-12-21 with total page 402 pages. Available in PDF, EPUB and Kindle. Book excerpt: A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack. Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used. Learn how to: Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity

Book Digital Forensics and Watermarking

Download or read book Digital Forensics and Watermarking written by Xianfeng Zhao and published by Springer Nature. This book was released on 2022-01-20 with total page 279 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology.

Book Handbook of Digital Forensics and Investigation

Download or read book Handbook of Digital Forensics and Investigation written by Eoghan Casey and published by Academic Press. This book was released on 2009-10-07 with total page 594 pages. Available in PDF, EPUB and Kindle. Book excerpt: Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). This handbook is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds *Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms *Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations

Book Digital Forensics and Incident Response

Download or read book Digital Forensics and Incident Response written by Gerard Johansen and published by Packt Publishing Ltd. This book was released on 2017-07-24 with total page 316 pages. Available in PDF, EPUB and Kindle. Book excerpt: A practical guide to deploying digital forensic techniques in response to cyber security incidents About This Book Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Who This Book Is For This book is targeted at Information Security professionals, forensics practitioners, and students with knowledge and experience in the use of software applications and basic command-line experience. It will also help professionals who are new to the incident response/digital forensics role within their organization. What You Will Learn Create and deploy incident response capabilities within your organization Build a solid foundation for acquiring and handling suitable evidence for later analysis Analyze collected evidence and determine the root cause of a security incident Learn to integrate digital forensic techniques and procedures into the overall incident response process Integrate threat intelligence in digital evidence analysis Prepare written documentation for use internally or with external parties such as regulators or law enforcement agencies In Detail Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom. By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization. Style and approach The book covers practical scenarios and examples in an enterprise setting to give you an understanding of how digital forensics integrates with the overall response to cyber security incidents. You will also learn the proper use of tools and techniques to investigate common cyber security incidents such as malware infestation, memory analysis, disk analysis, and network analysis.

Book Digital Forensics Processing and Procedures

Download or read book Digital Forensics Processing and Procedures written by David Lilburn Watson and published by Newnes. This book was released on 2013-08-30 with total page 914 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building and using a digital forensics lab A comprehensive guide for all roles in a digital forensics laboratory Based on international standards and certifications

Book Digital Forensics for Legal Professionals

Download or read book Digital Forensics for Legal Professionals written by Larry Daniel and published by Elsevier. This book was released on 2011-09-02 with total page 364 pages. Available in PDF, EPUB and Kindle. Book excerpt: Section 1: What is Digital Forensics? Chapter 1. Digital Evidence is Everywhere Chapter 2. Overview of Digital Forensics Chapter 3. Digital Forensics -- The Sub-Disciplines Chapter 4. The Foundations of Digital Forensics -- Best Practices Chapter 5. Overview of Digital Forensics Tools Chapter 6. Digital Forensics at Work in the Legal System Section 2: Experts Chapter 7. Why Do I Need an Expert? Chapter 8. The Difference between Computer Experts and Digital Forensic Experts Chapter 9. Selecting a Digital Forensics Expert Chapter 10. What to Expect from an Expert Chapter 11. Approaches by Different Types of Examiners Chapter 12. Spotting a Problem Expert Chapter 13. Qualifying an Expert in Court Sections 3: Motions and Discovery Chapter 14. Overview of Digital Evidence Discovery Chapter 15. Discovery of Digital Evidence in Criminal Cases Chapter 16. Discovery of Digital Evidence in Civil Cases Chapter 17. Discovery of Computers and Storage Media Chapter 18. Discovery of Video Evidence Ch ...