Computer Forensics
Evidence Collection and Management
Seiten
2007
Auerbach (Verlag)
978-0-8493-0561-0 (ISBN)
Auerbach (Verlag)
978-0-8493-0561-0 (ISBN)
Examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. This book presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to identify, retrieve, and protect valuable forensic evidence for prosecution.
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.
The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices.
Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.
The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices.
Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.
Newman, Robert C.
COMPUTER FORENSIC INVESTIGATION BASICS. Computer Forensic Investigation Basics. Policies, Standards, Laws, and Legal Processes. Electronic Forensic Examination Categories. Computer, Internet, and Electronic Crimes. Computers, Electronics, and Networking Environment. Investigative Tools, Technical Training, and Forensic Equipment. FORENSIC EVIDENCE COLLECTION AND MANAGEMENT. Managing the Crime/Incident Scene. Investigating Computer Center Incidents. Computer Systems Disk and File Structures. The Computer and Electronic Forensic Lab. Extracting Computer and Electronic Evidence. E-mail and Internet Investigations. Mobile Phone and PDA Investigations. Court Preparation, Presentations, and Testimony. Appendices.
Erscheint lt. Verlag | 9.3.2007 |
---|---|
Zusatzinfo | 22 Tables, black and white; 58 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 960 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Naturwissenschaften ► Biologie | |
Recht / Steuern ► Strafrecht ► Kriminologie | |
ISBN-10 | 0-8493-0561-6 / 0849305616 |
ISBN-13 | 978-0-8493-0561-0 / 9780849305610 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95