Acknowledgments
AS AUTHORS, LET’S be frank: It is almost impossible to be fully honest when assessing one’s own work. It’s also impossible to be fully independent or even neutral when attempting to assess or evaluate what one has written, no matter how hard one tries.
Thus, to remedy this truism, we, as most dedicated authors, reach out to colleagues, peers, and sometimes even to strangers (well, the publisher does) to provide us with a truly independent assessment and review of what we have written.
This assessment can occur at various stages of the development of a book, such as the one you are about to read, in segments or chapters, during its formative development stages, as a completed, draft manuscript or even once the last keystroke has been struck and development is finalized.
To achieve this sought after assessment, we have reached out to individuals whom we respect, asking them to critically review our work and to provide us with the benefit of their expertise and extensive knowledge in the fields of cyber forensics, audit, information technologies, e-discovery, and investigative sciences, as they critiqued the book you are about to read.
We are thankful for their assessment and suggestions for improvement, as they have provided us with valuable insights into refining our text and providing you the reader, with the most accurate and technically current material related to the emerging and evolving field of cyber forensic investigation and analysis.
While it is not possible to individually acknowledge all of the reviewers who have assessed our work, as some will forever remain anonymous, the authors would like to personally thank the following individuals for their insights, time, and involvement in making our development efforts result in a better overall examination and presentation of the science of cyber forensics.
To the following professionals, we say a heartfelt thank you . . .
Don Caniglia, CEGIT, CISA, CISM, FLMI
President
IT Risk Management Services, LLC
Richard J. Dippel, JD, MBA, CPA
Assistant Professor of Accounting
George Herbert Walker School of Business & Technology
Webster University
Linda C. Ertel, CISA
Security Compliance Analyst
Independent Reviewer
Steve Grimm
Webster Groves Police Department Detective
The Greater St. Louis Regional Computer Crime Education and Enforcement Group
Detective Andy Hrenak, CFCE/A+/ACE/DFCB
Hazelwood Police Department
RCCEEG Forensic Examiner
Jeff Lukins, CISSP, CEH, MCSE, MSE
Deputy IT Sec. Mgr., NASA MITS
Dynetics Technical Services, Inc.
Doug Menendez, CISA, CIA
Audit Manager
Graybar Electric Company
Bruce Monahan, CIA, CISA, CFE, CPCU
Chief Audit Executive
Selective Insurance Group, Inc.
Greg Strauss, CCE
Computer Forensics Expert
Independent Reviewer
Although not reviewers, we also wish to thank Ronelle and Jose, for providing us with a more personal means by which we were able to convey technical, cyber forensic concepts through a realistic case example. Thank you both!
Sincerely,
Al Marcella, Ph.D., CISA, CISM
Frederic Guillossou, CISSP, CCE