Cargando…

Forensic Computing

Forensic computing is becoming of primary importance as computers increasingly figure as sources of evidence in all sorts of criminal investigations. However, in order for such evidence to be legally useful, it is vital that it be collected and processed according to rigorous principles. In the seco...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Sammes, Anthony (Autor), Jenkinson, Brian (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Springer London : Imprint: Springer, 2007.
Edición:2nd ed. 2007.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-84628-732-9
003 DE-He213
005 20220127132637.0
007 cr nn 008mamaa
008 100301s2007 xxk| s |||| 0|eng d
020 |a 9781846287329  |9 978-1-84628-732-9 
024 7 |a 10.1007/978-1-84628-732-9  |2 doi 
050 4 |a TK7887.5-.8 
072 7 |a UK  |2 bicssc 
072 7 |a COM020010  |2 bisacsh 
072 7 |a UK  |2 thema 
082 0 4 |a 004.6  |2 23 
100 1 |a Sammes, Anthony.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Forensic Computing  |h [electronic resource] /  |c by Anthony Sammes, Brian Jenkinson. 
250 |a 2nd ed. 2007. 
264 1 |a London :  |b Springer London :  |b Imprint: Springer,  |c 2007. 
300 |a X, 470 p. 196 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Forensic Computing -- Understanding Information -- IT Systems Concepts -- PC Hardware and Inside the Box -- Disk Geometry -- The New Technology File System -- The Treatment of PCs -- The Treatment of Electronic Organisers -- Looking ahead (just a little bit more) -- Appendices: Common Character Codes; Some Common File Format Signatures; A Typical Set of POST Codes; Typical BIOS Beep Codes and Error Messages; Disk Partition Table Types; Extended Partitions; Registers and Order Code for the INtel 8086; NFTS Boot Sector and BIOS Parameter Block; MFT Header and Attribute Maps; The Relationship between CHS and LBA Addressing; Alternate Data Streams - a Brief Explanation. 
520 |a Forensic computing is becoming of primary importance as computers increasingly figure as sources of evidence in all sorts of criminal investigations. However, in order for such evidence to be legally useful, it is vital that it be collected and processed according to rigorous principles. In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered when it has been hidden or subverted by criminals, and give the reader the means to insure that it is accepted as admissible evidence in court. Updated to fall in line with ACPO 2003 guidelines, "Forensic Computing: A Practitioner's Guide" is illustrated with plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding in: * The principles involved in password protection and data encryption * The evaluation procedures used in circumventing a system's internal security safeguards * Full search and seizure protocols for experts and police officers. The new volume not only discusses the new file system technologies brought in by Windows XP and 2000 but now also considers modern fast drives, new encryption technologies, the practicalities of "live" analysis, and the problems inherent in examining personal organisers. Tony Sammes is Professor of Forensic Computing at Cranfield University and the Director of the Centre for Forensic Computing based at the Defence Academy in Shrivenham. His department has been more or less solely responsible for training and educating senior law enforcement officers in the UK in the art of forensic computing. His testimony as an expert witness has been called in a variety of cases, some of national importance. Brian Jenkinson is a retired Detective Inspector, formally Head of the Cambridgeshire Constabulary Fraud Squad. He is now an independent Forensic Computer Consultant and is also closely involved in teaching to both law enforcement and commercial practitioners. He was appointed Visiting Professor for Forensic Computing in 2002 at Cranfield University and the Defence Academy. 
650 0 |a Computer input-output equipment. 
650 0 |a Software engineering. 
650 0 |a Information retrieval. 
650 0 |a Computer architecture. 
650 0 |a Criminal law. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer networks . 
650 1 4 |a Input/Output and Data Communications. 
650 2 4 |a Software Engineering. 
650 2 4 |a Data Storage Representation. 
650 2 4 |a Criminal Law and Criminal Procedure Law. 
650 2 4 |a Cryptology. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Jenkinson, Brian.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781848005105 
776 0 8 |i Printed edition:  |z 9781849965965 
776 0 8 |i Printed edition:  |z 9781846283970 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-84628-732-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)