Computer forensics : an essential guide for accountants, lawyers, and managers / / Michael Sheetz.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2007 |
Language: | English |
Online Access: | |
Physical Description: | xvii, 152 p. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02888nam a2200373 a 4500 | ||
---|---|---|---|
001 | 500694238 | ||
003 | MiAaPQ | ||
005 | 20200520144314.0 | ||
006 | m o d | | ||
007 | cr cn||||||||| | ||
008 | 060912s2007 nju sb 001 0 eng d | ||
010 | |z 2006030331 | ||
020 | |z 9780471789321 (cloth) | ||
020 | |z 0471789321 (cloth) | ||
020 | |a 9780470124024 (electronic bk.) | ||
035 | |a (MiAaPQ)500694238 | ||
035 | |a (Au-PeEL)EBL694238 | ||
035 | |a (CaPaEBR)ebr10713577 | ||
035 | |a (CaONFJC)MIL494657 | ||
035 | |a (OCoLC)922903824 | ||
040 | |a MiAaPQ |c MiAaPQ |d MiAaPQ | ||
050 | 4 | |a HV8079.C65 |b S44 2007 | |
082 | 0 | 4 | |a 363.25 |2 22 |
100 | 1 | |a Sheetz, Michael. | |
245 | 1 | 0 | |a Computer forensics |h [electronic resource] : |b an essential guide for accountants, lawyers, and managers / |c Michael Sheetz. |
260 | |a Hoboken, N.J. : |b John Wiley & Sons, Inc., |c c2007. | ||
300 | |a xvii, 152 p. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index. | |
533 | |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. | ||
650 | 0 | |a Computer crimes |x Investigation. | |
655 | 4 | |a Electronic books. | |
710 | 2 | |a ProQuest (Firm) | |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=694238 |z Click to View |