|
|
|
|
LEADER |
04224nmm a2200529 u 4500 |
001 |
EB001914835 |
003 |
EBX01000000000000001077737 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0429135041
|
020 |
|
|
|a 0849305624
|
020 |
|
|
|a 9781466524859
|
020 |
|
|
|a 9780849305627
|
020 |
|
|
|a 1466524855
|
050 |
|
4 |
|a KF8961
|
100 |
1 |
|
|a Newman, Robert C.
|
245 |
0 |
0 |
|a Computer forensics
|b evidence collection and management
|c Robert C. Newman
|
260 |
|
|
|a Boca Raton, FL
|b Auerbach Publications
|c 2007
|
300 |
|
|
|a xxv, 404 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references (pages 397-398) and index
|
505 |
0 |
|
|a Computer forensic investigation basics -- Policies, standards, laws, and legal processes -- Computer forensic examination categories -- Computer, internet, and electronic crimes -- Computers, electronics, and networking environment -- Investigative tools, technical training, and forensic equipment -- Managing the crime/incident scene -- Investigating computer center incidents -- Computer systems disk and file structures -- The computer and electronic forensic lab -- Extracting computer and electronic evidence -- E-mail and internet investigations -- Mobile phone and PDA investigations -- Court preparation, presentations, and testimony
|
653 |
|
|
|a United States / fast / https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
|
653 |
|
|
|a sécurité informatique / rero
|
653 |
|
|
|a Computer crimes / Investigation / fast
|
653 |
|
|
|a Evidence, Expert / United States
|
653 |
|
|
|a Criminalité informatique / Enquêtes / États-Unis
|
653 |
|
|
|a criminalité informatique / Internet / sécurité informatique / rero
|
653 |
|
|
|a criminalité informatique / réseau informatique / sécurité informatique / rero
|
653 |
|
|
|a Evidence, Expert / fast
|
653 |
|
|
|a Computer crimes / Investigation / United States
|
653 |
|
|
|a Criminalité informatique / Enquêtes / États-Unis / ram
|
653 |
|
|
|a Expertises / États-Unis
|
653 |
|
|
|a Expertises / États-Unis / ram
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force
|
500 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002
|
028 |
5 |
0 |
|a 10.1201/9780849305627
|
015 |
|
|
|a GBB7C7309
|
776 |
|
|
|z 0849305616
|
776 |
|
|
|z 9781466524859
|
776 |
|
|
|z 9780849305610
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780849305627/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 345.73/0268
|
082 |
0 |
|
|a 364.1
|
520 |
|
|
|a Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation
|