Computer forensics : an essential guide for accountants, lawyers, and managers / / Michael Sheetz.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2007 |
Language: | English |
Online Access: | |
Physical Description: | xvii, 152 p. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500694238 |
---|---|
ctrlnum |
(MiAaPQ)500694238 (Au-PeEL)EBL694238 (CaPaEBR)ebr10713577 (CaONFJC)MIL494657 (OCoLC)922903824 |
collection |
bib_alma |
record_format |
marc |
spelling |
Sheetz, Michael. Computer forensics [electronic resource] : an essential guide for accountants, lawyers, and managers / Michael Sheetz. Hoboken, N.J. : John Wiley & Sons, Inc., c2007. xvii, 152 p. Includes bibliographical references and index. A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer crimes Investigation. Electronic books. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=694238 Click to View |
language |
English |
format |
Electronic eBook |
author |
Sheetz, Michael. |
spellingShingle |
Sheetz, Michael. Computer forensics an essential guide for accountants, lawyers, and managers / A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index. |
author_facet |
Sheetz, Michael. ProQuest (Firm) ProQuest (Firm) |
author_variant |
m s ms |
author2 |
ProQuest (Firm) |
author2_role |
TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Sheetz, Michael. |
title |
Computer forensics an essential guide for accountants, lawyers, and managers / |
title_sub |
an essential guide for accountants, lawyers, and managers / |
title_full |
Computer forensics [electronic resource] : an essential guide for accountants, lawyers, and managers / Michael Sheetz. |
title_fullStr |
Computer forensics [electronic resource] : an essential guide for accountants, lawyers, and managers / Michael Sheetz. |
title_full_unstemmed |
Computer forensics [electronic resource] : an essential guide for accountants, lawyers, and managers / Michael Sheetz. |
title_auth |
Computer forensics an essential guide for accountants, lawyers, and managers / |
title_new |
Computer forensics |
title_sort |
computer forensics an essential guide for accountants, lawyers, and managers / |
publisher |
John Wiley & Sons, Inc., |
publishDate |
2007 |
physical |
xvii, 152 p. |
contents |
A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index. |
isbn |
9780470124024 (electronic bk.) |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV8079 |
callnumber-sort |
HV 48079 C65 S44 42007 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=694238 |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
363 - Other social problems & services |
dewey-full |
363.25 |
dewey-sort |
3363.25 |
dewey-raw |
363.25 |
dewey-search |
363.25 |
oclc_num |
922903824 |
work_keys_str_mv |
AT sheetzmichael computerforensicsanessentialguideforaccountantslawyersandmanagers AT proquestfirm computerforensicsanessentialguideforaccountantslawyersandmanagers |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500694238 (Au-PeEL)EBL694238 (CaPaEBR)ebr10713577 (CaONFJC)MIL494657 (OCoLC)922903824 |
is_hierarchy_title |
Computer forensics an essential guide for accountants, lawyers, and managers / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330714151124992 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02888nam a2200373 a 4500</leader><controlfield tag="001">500694238</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">060912s2007 nju sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2006030331</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780471789321 (cloth)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0471789321 (cloth)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470124024 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500694238</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL694238</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10713577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL494657</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)922903824</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">S44 2007</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">363.25</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sheetz, Michael.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer forensics</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">an essential guide for accountants, lawyers, and managers /</subfield><subfield code="c">Michael Sheetz.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hoboken, N.J. :</subfield><subfield code="b">John Wiley & Sons, Inc.,</subfield><subfield code="c">c2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 152 p.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=694238</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |