Computer Forensics: Evidence Collection and Management
Autor Robert C. Newmanen Limba Engleză Paperback – 19 sep 2019
Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 345.89 lei 43-57 zile | |
CRC Press – 19 sep 2019 | 345.89 lei 43-57 zile | |
Hardback (1) | 519.72 lei 43-57 zile | |
CRC Press – 9 mar 2007 | 519.72 lei 43-57 zile |
Preț: 345.89 lei
Preț vechi: 443.16 lei
-22% Nou
Puncte Express: 519
Preț estimativ în valută:
66.20€ • 68.100$ • 55.11£
66.20€ • 68.100$ • 55.11£
Carte tipărită la comandă
Livrare economică 06-20 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367389376
ISBN-10: 0367389371
Pagini: 432
Dimensiuni: 156 x 234 x 23 mm
Greutate: 0.8 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Locul publicării:Boca Raton, United States
ISBN-10: 0367389371
Pagini: 432
Dimensiuni: 156 x 234 x 23 mm
Greutate: 0.8 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Locul publicării:Boca Raton, United States
Public țintă
UndergraduateCuprins
COMPUTER FORENSIC INVESTIGATION BASICS. Computer Forensic Investigation Basics. Policies, Standards, Laws, and Legal Processes. Electronic Forensic Examination Categories. Computer, Internet, and Electronic Crimes. Computers, Electronics, and Networking Environment. Investigative Tools, Technical Training, and Forensic Equipment. FORENSIC EVIDENCE COLLECTION AND MANAGEMENT. Managing the Crime/Incident Scene. Investigating Computer Center Incidents. Computer Systems Disk and File Structures. The Computer and Electronic Forensic Lab. Extracting Computer and Electronic Evidence. E-mail and Internet Investigations. Mobile Phone and PDA Investigations. Court Preparation, Presentations, and Testimony. Appendices.
Recenzii
". . . provides a coherent, systematic, and comprehensive analytical study of cybercrime, E-commerce, and Internet activities that could be used to exploit the Internet, the customers, and the various electronic devices employed by individuals, by government agencies, and by corporations . . . the ideal textbook for college level computer science and information technology courses, as well as non-special general readers with an interest in the subject."
– In Midwest Book Review, August 2007
“… is intended to five computer users in the business, government, and education communities, a basic technical competency in computer forensics, which essentially involves the identification, retrieval, and protection of electronic evidence found on computers for litigation and prosecution. Topics addressed in the first section include investigation basics, policies, standards, laws, and legal processes; types of crimes and incidents involved in computer forensics; the computing environment ant types of evidence; and investigative tools, technical training, and forensic equipment. The second half of the text focuses on evidence collection and management and includes chapters on managing the crime/incident scene, investigating computer center incidents, computer systems disks and the file structures, the computer and electronic forensic lab, extracting computer and electronic evidence, e-mail and Internet investigations, mobile phone and PDA investigations, and court presentations and testimony. Where the topics are nation-specific (laws, regulations, and such), the material is geared towards a US readership.”
— In Book News Inc., June 2007
– In Midwest Book Review, August 2007
“… is intended to five computer users in the business, government, and education communities, a basic technical competency in computer forensics, which essentially involves the identification, retrieval, and protection of electronic evidence found on computers for litigation and prosecution. Topics addressed in the first section include investigation basics, policies, standards, laws, and legal processes; types of crimes and incidents involved in computer forensics; the computing environment ant types of evidence; and investigative tools, technical training, and forensic equipment. The second half of the text focuses on evidence collection and management and includes chapters on managing the crime/incident scene, investigating computer center incidents, computer systems disks and the file structures, the computer and electronic forensic lab, extracting computer and electronic evidence, e-mail and Internet investigations, mobile phone and PDA investigations, and court presentations and testimony. Where the topics are nation-specific (laws, regulations, and such), the material is geared towards a US readership.”
— In Book News Inc., June 2007
Descriere
Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it is from a network, an individual computer, a telephone system, or personal electronic device. More importantly, it covers the proper techniques and procedures for collecting and preserving computer evidence that will stand up in a court of law. The book includes checklists on how evidence should be handled and recommends policies for organizations to adopt to protect themselves from malfeasance.