Computer Forensics: Evidence Collection and Management
Autor Robert C. Newmanen Limba Engleză Hardback – 9 mar 2007
Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 344.64 lei 6-8 săpt. | |
CRC Press – 19 sep 2019 | 344.64 lei 6-8 săpt. | |
Hardback (1) | 517.84 lei 6-8 săpt. | |
CRC Press – 9 mar 2007 | 517.84 lei 6-8 săpt. |
Preț: 517.84 lei
Preț vechi: 693.57 lei
-25% Nou
Puncte Express: 777
Preț estimativ în valută:
99.12€ • 106.58$ • 82.63£
99.12€ • 106.58$ • 82.63£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849305610
ISBN-10: 0849305616
Pagini: 430
Ilustrații: 58 b/w images and 22 tables
Dimensiuni: 156 x 234 x 28 mm
Greutate: 0.96 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Locul publicării:Boca Raton, United States
ISBN-10: 0849305616
Pagini: 430
Ilustrații: 58 b/w images and 22 tables
Dimensiuni: 156 x 234 x 28 mm
Greutate: 0.96 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Locul publicării:Boca Raton, United States
Public țintă
UndergraduateCuprins
COMPUTER FORENSIC INVESTIGATION BASICS. Computer Forensic Investigation Basics. Policies, Standards, Laws, and Legal Processes. Electronic Forensic Examination Categories. Computer, Internet, and Electronic Crimes. Computers, Electronics, and Networking Environment. Investigative Tools, Technical Training, and Forensic Equipment. FORENSIC EVIDENCE COLLECTION AND MANAGEMENT. Managing the Crime/Incident Scene. Investigating Computer Center Incidents. Computer Systems Disk and File Structures. The Computer and Electronic Forensic Lab. Extracting Computer and Electronic Evidence. E-mail and Internet Investigations. Mobile Phone and PDA Investigations. Court Preparation, Presentations, and Testimony. Appendices.
Recenzii
". . . provides a coherent, systematic, and comprehensive analytical study of cybercrime, E-commerce, and Internet activities that could be used to exploit the Internet, the customers, and the various electronic devices employed by individuals, by government agencies, and by corporations . . . the ideal textbook for college level computer science and information technology courses, as well as non-special general readers with an interest in the subject."
– In Midwest Book Review, August 2007
“… is intended to five computer users in the business, government, and education communities, a basic technical competency in computer forensics, which essentially involves the identification, retrieval, and protection of electronic evidence found on computers for litigation and prosecution. Topics addressed in the first section include investigation basics, policies, standards, laws, and legal processes; types of crimes and incidents involved in computer forensics; the computing environment ant types of evidence; and investigative tools, technical training, and forensic equipment. The second half of the text focuses on evidence collection and management and includes chapters on managing the crime/incident scene, investigating computer center incidents, computer systems disks and the file structures, the computer and electronic forensic lab, extracting computer and electronic evidence, e-mail and Internet investigations, mobile phone and PDA investigations, and court presentations and testimony. Where the topics are nation-specific (laws, regulations, and such), the material is geared towards a US readership.”
— In Book News Inc., June 2007
– In Midwest Book Review, August 2007
“… is intended to five computer users in the business, government, and education communities, a basic technical competency in computer forensics, which essentially involves the identification, retrieval, and protection of electronic evidence found on computers for litigation and prosecution. Topics addressed in the first section include investigation basics, policies, standards, laws, and legal processes; types of crimes and incidents involved in computer forensics; the computing environment ant types of evidence; and investigative tools, technical training, and forensic equipment. The second half of the text focuses on evidence collection and management and includes chapters on managing the crime/incident scene, investigating computer center incidents, computer systems disks and the file structures, the computer and electronic forensic lab, extracting computer and electronic evidence, e-mail and Internet investigations, mobile phone and PDA investigations, and court presentations and testimony. Where the topics are nation-specific (laws, regulations, and such), the material is geared towards a US readership.”
— In Book News Inc., June 2007
Descriere
Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it is from a network, an individual computer, a telephone system, or personal electronic device. More importantly, it covers the proper techniques and procedures for collecting and preserving computer evidence that will stand up in a court of law. The book includes checklists on how evidence should be handled and recommends policies for organizations to adopt to protect themselves from malfeasance.