Computer forensics an essential guide for accountants, lawyers, and managers /
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, N.J. :
John Wiley & Sons, Inc.,
c2007.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- A definition of computer forensics
- Introduction
- Forensic science
- The history of computer forensics
- The world wide web
- The hacker community
- Conclusion
- Basic of computer forensic concepts
- Introduction
- Understanding digital evidence
- Storage
- Processing
- What is computer data?
- Output
- Conclusion
- Preservation and collection of digital evidence
- Introduction
- Rules of evidence
- Preservation
- Collection
- Conclusion
- Analysis of digital evidence
- Introduction
- Forensic analysis
- Conclusion
- Reporting and rendering the opinion
- Introduction
- Preparing the report
- Presentation
- The trial process
- Conclusion
- Computer attacks
- Hackers and phreakz oh my
- The hacker: unauthorized use and trespassing
- Wireless hacking
- Malware
- Attacks from the inside
- Conclusion
- Computers as tools for evil
- Introduction
- Computers and crime
- Identity theft
- Concealment
- Auction fraud and retail cons
- Counterfeiting and forgery
- Prostitution
- Securities fraud
- Conclusion
- Computer tools and the forensic examination
- Introduction
- Assuming control of the case
- Understand the case
- Evaluate the evidence
- Examining the ?live? system
- Collecting data from a dead system
- Imaging the drive
- Data extraction
- Data analysis
- Conclusion
- Presenting digital evidence in court
- Introduction
- Evidence
- Types of evidence
- Expert witnesses
- Legal requirements of evidence
- Search and seizure
- Conclusion
- Index.