Computer forensics evidence collection and management

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networkin...

Full description

Bibliographic Details
Main Author: Newman, Robert C.
Format: eBook
Language:English
Published: Boca Raton, FL Auerbach Publications 2007
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04224nmm a2200529 u 4500
001 EB001914835
003 EBX01000000000000001077737
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0429135041 
020 |a 0849305624 
020 |a 9781466524859 
020 |a 9780849305627 
020 |a 1466524855 
050 4 |a KF8961 
100 1 |a Newman, Robert C. 
245 0 0 |a Computer forensics  |b evidence collection and management  |c Robert C. Newman 
260 |a Boca Raton, FL  |b Auerbach Publications  |c 2007 
300 |a xxv, 404 pages  |b illustrations 
505 0 |a Includes bibliographical references (pages 397-398) and index 
505 0 |a Computer forensic investigation basics -- Policies, standards, laws, and legal processes -- Computer forensic examination categories -- Computer, internet, and electronic crimes -- Computers, electronics, and networking environment -- Investigative tools, technical training, and forensic equipment -- Managing the crime/incident scene -- Investigating computer center incidents -- Computer systems disk and file structures -- The computer and electronic forensic lab -- Extracting computer and electronic evidence -- E-mail and internet investigations -- Mobile phone and PDA investigations -- Court preparation, presentations, and testimony 
653 |a United States / fast / https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 
653 |a sécurité informatique / rero 
653 |a Computer crimes / Investigation / fast 
653 |a Evidence, Expert / United States 
653 |a Criminalité informatique / Enquêtes / États-Unis 
653 |a criminalité informatique / Internet / sécurité informatique / rero 
653 |a criminalité informatique / réseau informatique / sécurité informatique / rero 
653 |a Evidence, Expert / fast 
653 |a Computer crimes / Investigation / United States 
653 |a Criminalité informatique / Enquêtes / États-Unis / ram 
653 |a Expertises / États-Unis 
653 |a Expertises / États-Unis / ram 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force 
500 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 
028 5 0 |a 10.1201/9780849305627 
015 |a GBB7C7309 
776 |z 0849305616 
776 |z 9781466524859 
776 |z 9780849305610 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780849305627/?ar  |x Verlag  |3 Volltext 
082 0 |a 345.73/0268 
082 0 |a 364.1 
520 |a Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation