Cargando…

Investigative Computer Forensics : the Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.

Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marrie...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Laykin, Erik
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Chichester : Wiley, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn841904569
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 130418s2013 xx o 000 0 eng d
010 |a  2012043301 
040 |a MHW  |b eng  |e pn  |c MHW  |d IDEBK  |d MEAUC  |d DEBSZ  |d YDXCP  |d S9I  |d U3W  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d DEBBG  |d COO  |d CEF  |d CNNOR  |d ICG  |d OCLCQ  |d UAB  |d DKC  |d OCLCQ  |d UKAHL  |d VLY  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1162049939 
020 |a 9781118221419 
020 |a 1118221419 
020 |a 1299464882 
020 |a 9781299464889 
020 |a 1118572114 
020 |a 9781118572115 
020 |a 1118235223 
020 |a 9781118235225 
029 1 |a AU@  |b 000060069972 
029 1 |a DEBBG  |b BV041912917 
029 1 |a DEBBG  |b BV044159689 
029 1 |a DEBSZ  |b 397177690 
029 1 |a DEBSZ  |b 423171151 
029 1 |a DEBSZ  |b 449272370 
035 |a (OCoLC)841904569  |z (OCoLC)1162049939 
050 4 |a HV8079.C65 L395 2013 
082 0 4 |a 363.25/968  |a 363.25968 
049 |a UAMI 
100 1 |a Laykin, Erik. 
245 1 0 |a Investigative Computer Forensics :  |b the Practical Guide for Lawyers, Accountants, Investigators, and Business Executives. 
260 |a Chichester :  |b Wiley,  |c 2013. 
300 |a 1 online resource (435 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both dome. 
505 0 |a Cover; Title Page; Copyright; Dedication; Foreword; Preface; Acknowledgments; Author's Note; Introduction: Investigative Computer Forensics; Changes in Technology; Changes in the Role of the Investigator; What Is Computer Forensics?; Chapter 1: The Glue; The Relevancy of Truth; Foundations of Digital Evidence; Investigative Objectives; The Investigative Process; Trust; Privacy; Chapter 2: A Primer on Computers and Networks; The Mechanics of Electronically Stored Information; Optical Drives; The Server; The Router; Application Data; Metadata; Databases; Internet Data; E-mail Mechanics. 
505 8 |a The IP AddressComputer Time Artifacts; Social Media; Tablets; Cellular Telephones and Smartphones; Audio and Video; The Global Nervous System: Worldwide Data; Fundamentals of Network Traffic; The Firewall; Data- and Traffic-Gathering Applications; Dynamic Data Capture; The Cloud; International Data Security and Privacy Issues; Chapter 3: Computer Forensic Fundamentals; The Establishment of the Computer Forensic Laboratory; Evidence and Access Controls; The Forensic Workstation; Current Tools and Services; Building a Team and a Process; Computer Forensic Certifications; The Human Quotient. 
505 8 |a The Devil Is in the DetailsChapter 4: Investigative Fundamentals; The Investigative Mind-Set; Case Management; Fraud and Investigative Analysis; Information Sources and Records; Investigative Techniques; Surveillance and Interviewing; Trade Secret Theft and IP Investigations; Human Resources and Interpersonal Investigations; Reporting and Testifying; Chapter 5: The Underpinnings of Investigative Computer Forensics; Seizure and Examination of Digital Evidence; Data Classification and Records Management; Deleted Data; Backups and Systems Preservation; Computer Crime Analysis and Reconstruction. 
505 8 |a The Who, What, Where, How of DataContracts Agreements, Third Parties, and Other Headaches; Ethics and Management; Chapter 6: Tactical Objectives and Challenges in Investigative Computer Forensics; Preparing for the Attack; Early Case Assessment; Investigative Pacing, Timing, and Setting Expectations; Working with Multinational Teams; Collections of Electronic Data in the Cloud and in Social Media; Investigating Internet Service Provider Records; Bridging the Actual World with the Cyberworld; Packaging the Findings; Chapter 7: The Cyber-Firefighters; Incident Response Fundamentals. 
505 8 |a Data BreachesTheft and Fraud; Systems Failures; Internal Investigations; The Real-Time Predicament; Building a Global Resource Network; Honeypots and Other Attractive Intel-Gathering Targets; Databases and Structured Data; Organized Crime in the Cyber-Underworld; The Cyber-Underworld in Various Regions; State-Sponsored Cybercrime; Identity Theft; Intellectual Property and Trade Secret Theft; Botnets, Malware, Trojans, and Phishing; Data Breach Vulnerabilities; Hackers and Their Environment; Chapter 8: E-Discovery Responsibilities; Data Identification; Electronic Discovery Reference Model. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer security. 
650 0 |a Fraud investigation. 
650 0 |a Corporations  |x Corrupt practices. 
650 2 |a Computer Security 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Sécurité informatique. 
650 6 |a Fraude  |x Enquêtes. 
650 6 |a Sociétés  |x Pratiques déloyales. 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Corporations  |x Corrupt practices  |2 fast 
650 7 |a Fraud investigation  |2 fast 
758 |i has work:  |a Investigative computer forensics (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGKcbPC6qPcwggYmbPXpxC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9780470932407 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=817953  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21629669 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis25297432 
938 |a YBP Library Services  |b YANK  |n 9984872 
938 |a YBP Library Services  |b YANK  |n 12671325 
994 |a 92  |b IZTAP