|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn841904569 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
130418s2013 xx o 000 0 eng d |
010 |
|
|
|a 2012043301
|
040 |
|
|
|a MHW
|b eng
|e pn
|c MHW
|d IDEBK
|d MEAUC
|d DEBSZ
|d YDXCP
|d S9I
|d U3W
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d ZCU
|d LIV
|d MERUC
|d OCLCQ
|d OCLCA
|d DEBBG
|d COO
|d CEF
|d CNNOR
|d ICG
|d OCLCQ
|d UAB
|d DKC
|d OCLCQ
|d UKAHL
|d VLY
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1162049939
|
020 |
|
|
|a 9781118221419
|
020 |
|
|
|a 1118221419
|
020 |
|
|
|a 1299464882
|
020 |
|
|
|a 9781299464889
|
020 |
|
|
|a 1118572114
|
020 |
|
|
|a 9781118572115
|
020 |
|
|
|a 1118235223
|
020 |
|
|
|a 9781118235225
|
029 |
1 |
|
|a AU@
|b 000060069972
|
029 |
1 |
|
|a DEBBG
|b BV041912917
|
029 |
1 |
|
|a DEBBG
|b BV044159689
|
029 |
1 |
|
|a DEBSZ
|b 397177690
|
029 |
1 |
|
|a DEBSZ
|b 423171151
|
029 |
1 |
|
|a DEBSZ
|b 449272370
|
035 |
|
|
|a (OCoLC)841904569
|z (OCoLC)1162049939
|
050 |
|
4 |
|a HV8079.C65 L395 2013
|
082 |
0 |
4 |
|a 363.25/968
|a 363.25968
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Laykin, Erik.
|
245 |
1 |
0 |
|a Investigative Computer Forensics :
|b the Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.
|
260 |
|
|
|a Chichester :
|b Wiley,
|c 2013.
|
300 |
|
|
|a 1 online resource (435 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both dome.
|
505 |
0 |
|
|a Cover; Title Page; Copyright; Dedication; Foreword; Preface; Acknowledgments; Author's Note; Introduction: Investigative Computer Forensics; Changes in Technology; Changes in the Role of the Investigator; What Is Computer Forensics?; Chapter 1: The Glue; The Relevancy of Truth; Foundations of Digital Evidence; Investigative Objectives; The Investigative Process; Trust; Privacy; Chapter 2: A Primer on Computers and Networks; The Mechanics of Electronically Stored Information; Optical Drives; The Server; The Router; Application Data; Metadata; Databases; Internet Data; E-mail Mechanics.
|
505 |
8 |
|
|a The IP AddressComputer Time Artifacts; Social Media; Tablets; Cellular Telephones and Smartphones; Audio and Video; The Global Nervous System: Worldwide Data; Fundamentals of Network Traffic; The Firewall; Data- and Traffic-Gathering Applications; Dynamic Data Capture; The Cloud; International Data Security and Privacy Issues; Chapter 3: Computer Forensic Fundamentals; The Establishment of the Computer Forensic Laboratory; Evidence and Access Controls; The Forensic Workstation; Current Tools and Services; Building a Team and a Process; Computer Forensic Certifications; The Human Quotient.
|
505 |
8 |
|
|a The Devil Is in the DetailsChapter 4: Investigative Fundamentals; The Investigative Mind-Set; Case Management; Fraud and Investigative Analysis; Information Sources and Records; Investigative Techniques; Surveillance and Interviewing; Trade Secret Theft and IP Investigations; Human Resources and Interpersonal Investigations; Reporting and Testifying; Chapter 5: The Underpinnings of Investigative Computer Forensics; Seizure and Examination of Digital Evidence; Data Classification and Records Management; Deleted Data; Backups and Systems Preservation; Computer Crime Analysis and Reconstruction.
|
505 |
8 |
|
|a The Who, What, Where, How of DataContracts Agreements, Third Parties, and Other Headaches; Ethics and Management; Chapter 6: Tactical Objectives and Challenges in Investigative Computer Forensics; Preparing for the Attack; Early Case Assessment; Investigative Pacing, Timing, and Setting Expectations; Working with Multinational Teams; Collections of Electronic Data in the Cloud and in Social Media; Investigating Internet Service Provider Records; Bridging the Actual World with the Cyberworld; Packaging the Findings; Chapter 7: The Cyber-Firefighters; Incident Response Fundamentals.
|
505 |
8 |
|
|a Data BreachesTheft and Fraud; Systems Failures; Internal Investigations; The Real-Time Predicament; Building a Global Resource Network; Honeypots and Other Attractive Intel-Gathering Targets; Databases and Structured Data; Organized Crime in the Cyber-Underworld; The Cyber-Underworld in Various Regions; State-Sponsored Cybercrime; Identity Theft; Intellectual Property and Trade Secret Theft; Botnets, Malware, Trojans, and Phishing; Data Breach Vulnerabilities; Hackers and Their Environment; Chapter 8: E-Discovery Responsibilities; Data Identification; Electronic Discovery Reference Model.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Fraud investigation.
|
650 |
|
0 |
|a Corporations
|x Corrupt practices.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Fraude
|x Enquêtes.
|
650 |
|
6 |
|a Sociétés
|x Pratiques déloyales.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Corporations
|x Corrupt practices
|2 fast
|
650 |
|
7 |
|a Fraud investigation
|2 fast
|
758 |
|
|
|i has work:
|a Investigative computer forensics (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGKcbPC6qPcwggYmbPXpxC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|z 9780470932407
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=817953
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21629669
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis25297432
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9984872
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12671325
|
994 |
|
|
|a 92
|b IZTAP
|