Computer forensics : an essential guide for accountants, lawyers, and managers / Michael Sheetz.
Material type: TextPublication details: Hoboken, N.J. : John Wiley & Sons, Inc., c2007Description: xvii, 152 p. ; 24 cmISBN: 9780471789321 (hbk.)Subject(s): Computer crimes -- InvestigationDDC classification: 363.25 LOC classification: HV8079.C65 | S54 2007Online resources: Table of contents only | Contributor biographical information | Publisher descriptionItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APU Library Open Shelf | Book | HV8079.C65 S54 2007 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00021820 | |
General Circulation | APU Library Open Shelf | Book | HV8079.C65 S54 2007 c.2 (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00021819 |
Includes bibliographical references and index.
A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
There are no comments on this title.