Computer forensics : cybercriminals, laws, and evidence / by Marie-Helen Maras.
Material type: TextPublication details: Sudbury, Mass. : Jones & Bartlett Learning, c2012Description: xiv, 368 p. ; ill. ; 23 cmISBN: 9781449600723 (pbk.); 1449600727 (pbk.)Subject(s): Electronic evidence -- United States | Computer crimes -- Investigation -- United StatesDDC classification: 363.25968 LOC classification: KF8947.5 | .M37 2012Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APU Library Open Shelf | Book | KF8947.5 .M37 2012 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00021862 | |
General Circulation | APU Library Open Shelf | Book | KF8947.5 .M37 2012 c.2 (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00021863 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
KF6289 .J66 2015 c.1 Principles of taxation for business and investment planning / | KF6369.6 E76 2011 c.1 The Ernst & Young tax guide 2012 / | KF8947.5 .M37 2012 c.1 Computer forensics : | KF8947.5 .M37 2012 c.2 Computer forensics : | KF8947.5 .M37 2015 c.1 Computer forensics : | KF8947.5 .M37 2015 c.2 Computer forensics : | KF8947.5 .M37 2015 c.3 Computer forensics : |
Includes bibliographical references and index.
Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile phones and pdas in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator.
There are no comments on this title.