Computer forensics an essential guide for accountants, lawyers, and managers /
Wedi'i Gadw mewn:
| Prif Awdur: | |
|---|---|
| Awdur Corfforaethol: | |
| Fformat: | Electronig eLyfr |
| Iaith: | Saesneg |
| Cyhoeddwyd: |
Hoboken, N.J. :
John Wiley & Sons, Inc.,
c2007.
|
| Pynciau: | |
| Mynediad Ar-lein: | An electronic book accessible through the World Wide Web; click to view |
| Tagiau: |
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 0000169781 | ||
| 005 | 20171002063534.0 | ||
| 006 | m o u | ||
| 007 | cr cn||||||||| | ||
| 008 | 060912s2007 nju sb 001 0 eng d | ||
| 010 | |z 2006030331 | ||
| 020 | |z 9780471789321 (cloth) | ||
| 020 | |z 0471789321 (cloth) | ||
| 020 | |z 9780470124024 (e-book) | ||
| 035 | |a (CaPaEBR)ebr10713577 | ||
| 035 | |a (OCoLC)183266597 | ||
| 040 | |a CaPaEBR |c CaPaEBR | ||
| 050 | 1 | 4 | |a HV8079.C65 |b S44 2007eb |
| 082 | 0 | 4 | |a 363.25 |2 22 |
| 100 | 1 | |a Sheetz, Michael. | |
| 245 | 1 | 0 | |a Computer forensics |h [electronic resource] : |b an essential guide for accountants, lawyers, and managers / |c Michael Sheetz. |
| 260 | |a Hoboken, N.J. : |b John Wiley & Sons, Inc., |c c2007. | ||
| 300 | |a xvii, 152 p. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index. | |
| 533 | |a Electronic reproduction. |b Palo Alto, Calif. : |c ebrary, |d 2013. |n Available via World Wide Web. |n Access may be limited to ebrary affiliated libraries. | ||
| 650 | 0 | |a Computer crimes |x Investigation. | |
| 655 | 7 | |a Electronic books. |2 local | |
| 710 | 2 | |a ebrary, Inc. | |
| 856 | 4 | 0 | |u http://site.ebrary.com/lib/daystar/Doc?id=10713577 |z An electronic book accessible through the World Wide Web; click to view |
| 908 | |a 170314 | ||
| 942 | 0 | 0 | |c EB |
| 999 | |c 158924 |d 158924 | ||