Computer forensics an essential guide for accountants, lawyers, and managers /

Saved in:
Bibliographic Details
Main Author: Sheetz, Michael
Corporate Author: ebrary, Inc
Format: Electronic eBook
Language:English
Published: Hoboken, N.J. : John Wiley & Sons, Inc., c2007.
Subjects:
Online Access:An electronic book accessible through the World Wide Web; click to view
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 0000169781
005 20171002063534.0
006 m o u
007 cr cn|||||||||
008 060912s2007 nju sb 001 0 eng d
010 |z  2006030331 
020 |z 9780471789321 (cloth) 
020 |z 0471789321 (cloth) 
020 |z 9780470124024 (e-book) 
035 |a (CaPaEBR)ebr10713577 
035 |a (OCoLC)183266597 
040 |a CaPaEBR  |c CaPaEBR 
050 1 4 |a HV8079.C65  |b S44 2007eb 
082 0 4 |a 363.25  |2 22 
100 1 |a Sheetz, Michael. 
245 1 0 |a Computer forensics  |h [electronic resource] :  |b an essential guide for accountants, lawyers, and managers /  |c Michael Sheetz. 
260 |a Hoboken, N.J. :  |b John Wiley & Sons, Inc.,  |c c2007. 
300 |a xvii, 152 p. 
504 |a Includes bibliographical references and index. 
505 0 |a A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index. 
533 |a Electronic reproduction.  |b Palo Alto, Calif. :  |c ebrary,  |d 2013.  |n Available via World Wide Web.  |n Access may be limited to ebrary affiliated libraries. 
650 0 |a Computer crimes  |x Investigation. 
655 7 |a Electronic books.  |2 local 
710 2 |a ebrary, Inc. 
856 4 0 |u http://site.ebrary.com/lib/daystar/Doc?id=10713577  |z An electronic book accessible through the World Wide Web; click to view 
908 |a 170314 
942 0 0 |c EB 
999 |c 158924  |d 158924