000 | 01972cam a2200325 i 4500 | ||
---|---|---|---|
999 |
_c379905 _d379905 |
||
001 | 17993702 | ||
003 | APU | ||
005 | 20190623035641.0 | ||
008 | 140110s2015 mauak b 001 0 eng | ||
010 | _a 2013048189 | ||
020 | _a9781449692223 (pbk.) | ||
020 | _a1449692222 (pbk.) | ||
040 |
_aDLC _beng _cDLC _erda _dNIK |
||
042 | _apcc | ||
043 | _an-us--- | ||
050 | 0 | 0 |
_aKF8947.5 _b.M37 2015 |
082 | 0 | 0 |
_a363.25/9680973 _223 |
100 | 1 |
_aMaras, Marie-Helen. _914236 |
|
245 | 1 | 0 |
_aComputer forensics : _bcybercriminals, laws, and evidence / _cMarie-Helen Maras and John Jay. |
250 | _a2nd ed. | ||
260 | _cc2015. | ||
300 |
_axv, 408 p. : _bill. ; _c23 cm |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aEntering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile devices in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator. | |
650 | 0 |
_aElectronic evidence _zUnited States. _914237 |
|
650 | 0 |
_aComputer crimes _xInvestigation _zUnited States. _914238 |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBook |