|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocn857712561 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130906s2013 ne ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d OCLCQ
|d OPELS
|d E7B
|d OCLCQ
|d UIU
|d OCLCQ
|d COO
|d OCLCQ
|d AZK
|d AGLDB
|d K6U
|d Z5A
|d PIFAG
|d FVL
|d LIV
|d OCLCQ
|d U3W
|d STF
|d OCLCF
|d D6H
|d TOF
|d OCLCQ
|d TKN
|d UKAHL
|d BRF
|d OCLCO
|d OCL
|d QGK
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 961574910
|a 1259256646
|
020 |
|
|
|a 1299833144
|q (electronic bk.)
|
020 |
|
|
|a 9781299833142
|q (electronic bk.)
|
020 |
|
|
|a 9781597497459
|q (e-book)
|
020 |
|
|
|a 1597497452
|q (e-book)
|
020 |
|
|
|z 9781597497428
|
020 |
|
|
|z 1597497428
|
029 |
1 |
|
|a AU@
|b 000057230332
|
029 |
1 |
|
|a CHNEW
|b 001011384
|
029 |
1 |
|
|a DEBBG
|b BV042314346
|
029 |
1 |
|
|a DEBSZ
|b 405350554
|
029 |
1 |
|
|a NZ1
|b 15197938
|
029 |
1 |
|
|a NZ1
|b 16034165
|
035 |
|
|
|a (OCoLC)857712561
|z (OCoLC)961574910
|z (OCoLC)1259256646
|
037 |
|
|
|a 514565
|b MIL
|
050 |
|
4 |
|a HV8079.C65
|b W38 2013
|
082 |
0 |
4 |
|a 363.250285
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Watson, David
|q (David Lilburn)
|1 https://id.oclc.org/worldcat/entity/E39PCjtkpGQ9Xgkd9wWQWbd4v3
|
245 |
1 |
0 |
|a Digital forensics processing and procedures :
|b meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements /
|c David Watson, Andrew Jones.
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Syngress,
|c 2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building and using a digital forensics lab. A comprehensive guide for all roles in a digital forensics laboratoryBased on international standards and certifications.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g 1.
|t Introduction --
|g 1.1.
|t Introduction --
|g Appendix 1
|t Some Types of Cases Involving Digital Forensics --
|g Appendix 2
|t Growth of Hard Disk Drives for Personal Computers --
|g Appendix 3
|t Disk Drive Size Nomenclature --
|g 2.
|t Forensic Laboratory Accommodation --
|g 2.1.
|t The Building --
|g 2.2.
|t Protecting Against External and Environmental Threats --
|g 2.3.
|t Utilities and Services --
|g 2.4.
|t Physical Security --
|g 2.5.
|t Layout of the Forensic Laboratory --
|g Appendix 1
|t Sample Outline for a Business Case --
|g Appendix 2
|t Forensic Laboratory Physical Security Policy --
|g 3.
|t Setting up the Forensic Laboratory --
|g 3.1.
|t Setting up the Forensic Laboratory --
|g Appendix 1
|t The Forensic Laboratory ToR --
|g Appendix 2
|t Cross Reference between ISO 9001 and ISO 17025 --
|g Appendix 3
|t Conflict of Interest Policy --
|g Appendix 4
|t Quality Policy --
|g 4.
|t The Forensic Laboratory Integrated Management System --
|g 4.1.
|t Introduction --
|g 4.2.
|t Benefits --
|g 4.3.
|t The Forensic Laboratory IMS --
|g 4.4.
|t The Forensic Laboratory Policies --
|g 4.5.
|t Planning --
|g 4.6.
|t Implementation and Operation --
|g 4.7.
|t Performance Assessment --
|g 4.8.
|t Continuous Improvement --
|g 4.9.
|t Management Reviews --
|g Appendix 1
|t Mapping ISO Guide 72 Requirements to PAS 99 --
|g Appendix 2
|t PAS 99 Glossary --
|g Appendix 3
|t PAS 99 Mapping to IMS Procedures --
|g Appendix 4
|t The Forensic Laboratory Goal Statement --
|g Appendix 5
|t The Forensic Laboratory Baseline Measures --
|g Appendix 6
|t Environment Policy --
|g Appendix 7
|t Health and Safety Policy --
|g Appendix 8
|t Undue Influene Policy --
|g Appendix 9
|t Business Continuity Policy --
|g Appendix 10
|t Information Security Policy --
|g Appendix 11
|t Access Control Policy --
|g Appendix 12
|t Change or Termination Policy --
|g Appendix 13
|t Clear Desk and Clear Screen Policy --
|g Appendix 14
|t Continuous Improvement Policy --
|g Appendix 15
|t Cryptographic Control Policy --
|g Appendix 16
|t Document Retention Policy --
|g Appendix 17
|t Financial Management Policy --
|g Appendix 18
|t Mobile Devices Policy --
|g Appendix 19
|t Network Service Policy --
|g Appendix 20
|t Personnel Screening Policy --
|g Appendix 21
|t Relationship Management Policy --
|g Appendix 22
|t Release Management Policy --
|g Appendix 23
|t Service Management Policy --
|g Appendix 24
|t Service Reporting Policy --
|g Appendix 25
|t Third-Party Access Control Policy --
|g Appendix 26
|t Acceptable use Policy --
|g Appendix 27
|t Audit Committee --
|g Appendix 28
|t Business Continuity Committee --
|g Appendix 29
|t Environment Committee --
|g Appendix 30
|t Health and Safety Committee --
|g Appendix 31
|t Information Security Committee --
|g Appendix 32
|t Quality Committee --
|g Appendix 33
|t Risk Committee --
|g Appendix 34
|t Service Delivery Committee --
|g Appendix 35
|t Whistle Blowing Policy --
|g Appendix 36
|t Management Review Agenda --
|g Appendix 37
|t Document Control Checklist --
|g Appendix 38
|t Document Metadata --
|g Appendix 39
|t File-Naming Standards --
|g Appendix 40
|t Watermarks in Use in the Forensic Laboratory --
|g Appendix 41
|t Document Review Form --
|g Appendix 42
|t IMS Calendar --
|g Appendix 43
|t Audit Plan Letter --
|g Appendix 44
|t Audit Reporting Form --
|g Appendix 45
|t CAR/PAR Form --
|g Appendix 46
|t Opening Meeting Agenda --
|g Appendix 47
|t Closing Meeting Agenda --
|g Appendix 48
|t Audit Report Template --
|g Appendix 49
|t Root Causes for Non-Conformity --
|g 5.
|t Risk Management --
|g 5.1.
|t A Short History of Risk Management --
|g 5.2.
|t An Information Security Risk Management Framework --
|g 5.3.
|t Framework Stage 1 -- ISMS Policy --
|g 5.4.
|t Framework Stage 2: Planning, Resourcing, and Communication --
|g 5.5.
|t Framework Stage 3: Information Security Risk Management Process --
|g 5.6.
|t Framework Stage 4: Implementation and Operational Procedures --
|g 5.7.
|t Framework Stage 5: Follow-up Procedures --
|g Appendix 1
|t Sample Communication Plan --
|g Appendix 2
|t Sample Information Security Plan --
|g Appendix 3
|t Asset Type Examples --
|g Appendix 4
|t Asset Values --
|g Appendix 5
|t Consequences Table --
|g Appendix 6
|t Some Common Business Risks --
|g Appendix 7
|t Some Common Project Risks --
|g Appendix 8
|t Security Threat Examples --
|g Appendix 9
|t Common Security Vulnerabilities --
|g Appendix 10
|t Risk Management Policy --
|g Appendix 11
|t The IMS and ISMS Scope Document --
|g Appendix 12
|t Criticality Ratings --
|g Appendix 13
|t Likelihood of Occurrence --
|g Appendix 14
|t Risk Appetite --
|g Appendix 15
|t Security Controls from CobIT and NIST 800-53 --
|g Appendix 16
|t Information Classification --
|g Appendix 17
|t The Corporate Risk Register --
|g Appendix 18
|t Comparison between Qualitative and Quantitative Methods --
|g Appendix 19
|t Mapping Control Functions to ISO 27001 --
|g Appendix 20
|t Mapping Security Concerns to ISO 27001 --
|g Appendix 21
|t SoA Template --
|g Appendix 22
|t The Forensic Laboratory's Security Metrics Report --
|g Appendix 23
|t Mapping ISO 31000 and ISO 27001 to IMS Procedures --
|g 6.
|t Quality in the Forensic Laboratory --
|g 6.1.
|t Quality and Good Laboratory Practice --
|g 6.2.
|t Management Requirements for Operating the Forensic Laboratory --
|g 6.3.
|t ISO 9001 for the Forensic Laboratory --
|g 6.4.
|t The Forensic Laboratory's QMS --
|g 6.5.
|t Responsibilities in the QMS --
|g 6.6.
|t Managing Sales --
|g 6.7.
|t Product and Service Realization --
|g 6.8.
|t Reviewing Deliverables --
|g 6.9.
|t Signing Off a Case --
|g 6.10.
|t Archiving a Case --
|g 6.11.
|t Maintaining Client Confidentiality --
|g 6.12.
|t Technical Requirements for the Forensic Laboratory --
|g 6.13.
|t Measurement, Analysis, and Improvement --
|g 6.14.
|t Managing Client Complaints --
|g Appendix 1
|t Mapping ISO 9001 to IMS Procedures --
|g Appendix 2
|t Mapping ISO 17025 to IMS Procedures --
|g Appendix 3
|t Mapping SWGDE Quality Requirements to IMS Procedures --
|g Appendix 4
|t Mapping NIST-150 Quality Requirements to IMS Procedures --
|g Appendix 5
|t Mapping ENFSI Quality Requirements to IMS Procedures --
|g Appendix 6
|t Mapping FSR Quality Requirements to IMS Procedures --
|g Appendix 7
|t Quality Manager, Job Description --
|g Appendix 8
|t Business Plan Template --
|g Appendix 9
|t Business KPIs --
|g Appendix 10
|t Quality Plan Contents --
|g Appendix 11
|t Induction Checklist Contents --
|g Appendix 12
|t Induction Feedback --
|g Appendix 13
|t Standard Proposal Template --
|g Appendix 14
|t Issues to Consider for Case Processing --
|g Appendix 15
|t Standard Quotation Contents --
|g Appendix 16
|t Standard Terms and Conditions --
|g Appendix 17
|t ERMS Client Areas --
|g Appendix 18
|t Cost Estimation Spreadsheet --
|g Appendix 19
|t Draft Review Form --
|g Appendix 20
|t Client Sign-Off and Feedback Form --
|g Appendix 21
|t Information Required for Registering a Complaint --
|g Appendix 22
|t Complaint Resolution Timescales --
|g Appendix 23
|t Complaint Metrics --
|g Appendix 24
|t Laboratory Manager, Job Description --
|g Appendix 25
|t Forensic Analyst, Job Description --
|g Appendix 26
|t Training Agenda --
|g Appendix 27
|t Some Individual Forensic Certifications --
|g Appendix 28
|t Minimum Equipment Records Required by ISO 17025 --
|g Appendix 29
|t Reference Case Tests --
|g Appendix 30
|t ISO 17025 Reporting Requirements --
|g Appendix 31
|t Standard Forensic Laboratory Report --
|g 7.
|t IT Infrastructure --
|g 7.1.
|t Hardware --
|g 7.2.
|t Software --
|g 7.3.
|t Infrastructure --
|g 7.4.
|t Process Management --
|g 7.5.
|t Hardware Management --
|g 7.6.
|t Software Management --
|g 7.7.
|t Network Management --
|g Appendix 1
|t Some Forensic Workstation Providers --
|g Appendix 2
|t Some Mobile Forensic Workstation Providers --
|g Appendix 3
|t Standard Build for a Forensic Workstation --
|g Appendix 4
|t Some Case Processing Tools --
|g Appendix 5
|t Policy for Securing IT Cabling --
|g Appendix 6
|t Policy for Siting and Protecting IT Equipment --
|g Appendix 7
|t ISO 20000-1 Mapping --
|g Appendix 8
|t Service Desk Manager, Job Description --
|g Appendix 9
|t Incident Manager, Job Description --
|g Appendix 10
|t Incident Status Levels --
|g Appendix 11
|t Incident Priority Levels --
|g Appendix 12
|t Service Desk Feedback Form --
|g Appendix 13
|t Problem Manager, Job Description --
|g Appendix 14
|t Contents of the Forensic Laboratory SIP --
|g Appendix 15
|t Change Categories --
|g Appendix 16
|t Change Manager, Job Description --
|g Appendix 17
|t Standard Requirements of a Request for Change --
|g Appendix 18
|t Emergency Change Policy --
|g Appendix 19
|t Release Management Policy --
|g Appendix 20
|t Release Manager, Job Description --
|g Appendix 21
|t Configuration Management Plan Contents --
|g Appendix 22
|t Configuration Management Policy --
|g Appendix 23
|t Configuration Manager, Job Description --
|g Appendix 24
|t Information Stored in the DSL and DHL --
|g Appendix 25
|t Capacity Manager, Job Description --
|g Appendix 26
|t Capacity Management Plan --
|g Appendix 27
|t Service Management Policy
|
505 |
0 |
0 |
|t --
|g Appendix 28
|t Service Level Manager, Job Description --
|g Appendix 29
|t Service Reporting Policy --
|g Appendix 30
|t Policy for Maintaining and Servicing IT Equipment --
|g Appendix 31
|t ISO 17025 Tool Test Method Documentation --
|g Appendix 32
|t Standard Forensic Tool Tests --
|g Appendix 33
|t Forensic Tool Test Report Template --
|g Appendix 34
|t Overnight Backup Checklist --
|g 8.
|t Incident Response --
|g 8.1.
|t General --
|g 8.2.
|t Evidence --
|g 8.3.
|t Incident Response as a Process --
|g 8.4.
|t Initial Contact --
|g 8.5.
|t Types of First Response --
|g 8.6.
|t The Incident Scene --
|g 8.7.
|t Transportation to the Forensic Laboratory --
|g 8.8.
|t Crime Scene and Seizure Reports --
|g 8.9.
|t Postincident Review --
|g Appendix 1
|t Mapping ISO 17020 to IMS Procedures --
|g Appendix 2
|t First Response Briefing Agenda --
|g Appendix 3
|t Contents of the Grab Bag --
|g Appendix 4
|t New Case Form --
|g Appendix 5
|t First Responder Seizure Summary Log --
|g Appendix 6
|t Site Summary Form --
|g Appendix 7
|t Seizure Log --
|g Appendix 8
|t Evidence Locations in Devices and Media --
|g Appendix 9
|t Types of Evidence Typically Needed for a Case --
|g Appendix 10
|t The On/Off Rule.
|
505 |
0 |
0 |
|g Note continued:
|g Appendix 11
|t Some Types of Metadata That may be Recoverable from Digital Images --
|g Appendix 12
|t Countries with Different Fixed Line Telephone Connections --
|g Appendix 13
|t Some Interview Questions --
|g Appendix 14
|t Evidence Labeling --
|g Appendix 15
|t Forensic Preview Forms --
|g Appendix 16
|t A Traveling Forensic Laboratory --
|g Appendix 17
|t Movement Sheet --
|g Appendix 18
|t Incident Response Report --
|g Appendix 19
|t Postincident Review Agenda --
|g Appendix 20
|t Incident Processing Checklist --
|g 9.
|t Case Processing --
|g 9.1.
|t Introduction to Case Processing --
|g 9.2.
|t Case Types --
|g 9.3.
|t Precase Processing --
|g 9.4.
|t Equipment Maintenance --
|g 9.5.
|t Management Processes --
|g 9.6.
|t Booking Exhibits in and out of the Secure Property Store --
|g 9.7.
|t Starting a New Case --
|g 9.8.
|t Preparing the Forensic Workstation --
|g 9.9.
|t Imaging --
|g 9.10.
|t Examination --
|g 9.11.
|t Dual Tool Verification --
|g 9.12.
|t Digital Time Stamping --
|g 9.13.
|t Production of an Internal Case Report --
|g 9.14.
|t Creating Exhibits --
|g 9.15.
|t Producing a Case Report for External Use --
|g 9.16.
|t Statements, Depositions, and Similar --
|g 9.17.
|t Forensic Software Tools --
|g 9.18.
|t Backing up and Archiving a Case --
|g 9.19.
|t Disclosure --
|g 9.20.
|t Disposal --
|g Appendix 1
|t Some International Forensic Good Practice --
|g Appendix 2
|t Some International and National Standards Relating to Digital Forensics --
|g Appendix 3
|t Hard Disk Log Details --
|g Appendix 4
|t Disk History Log --
|g Appendix 5
|t Tape Log Details --
|g Appendix 6
|t Tape History Log --
|g Appendix 7
|t Small Digital Media Log Details --
|g Appendix 8
|t Small Digital Media Device Log --
|g Appendix 9
|t Forensic Case Work Log --
|g Appendix 10
|t Case Processing KPIs --
|g Appendix 11
|t Contents of Sample Exhibit Rejection Letter --
|g Appendix 12
|t Sample Continuity Label Contents --
|g Appendix 13
|t Details of the Forensic Laboratory Property Log --
|g Appendix 14
|t Exhibit Acceptance Letter Template --
|g Appendix 15
|t Property Special Handling Log --
|g Appendix 16
|t Evidence Sought --
|g Appendix 17
|t Request for Forensic Examination --
|g Appendix 18
|t Client Virtual Case File Structure --
|g Appendix 19
|t Computer Details Log --
|g Appendix 20
|t Other Equipment Details Log --
|g Appendix 21
|t Hard Disk Details Log --
|g Appendix 22
|t Other Media Details Log --
|g Appendix 23
|t Cell Phone Details Log --
|g Appendix 24
|t Other Device Details Log --
|g Appendix 25
|t Some Evidence Found in Volatile Memory --
|g Appendix 26
|t Some File Metadata --
|g Appendix 27
|t Case Progress Checklist --
|g Appendix 28
|t Meeting the Requirements of HB 171 --
|g Appendix 29
|t Internal Case Report Template --
|g Appendix 30
|t Forensic Laboratory Exhibit Log --
|g Appendix 31
|t Report Production Checklist --
|g 10.
|t Case Management --
|g 10.1.
|t Overview --
|g 10.2.
|t Hard Copy Forms --
|g 10.3.
|t MARS --
|g 10.4.
|t Setting up a New Case --
|g 10.5.
|t Processing a Forensic Case --
|g 10.6.
|t Reports General --
|g 10.7.
|t Administrator's Reports --
|g 10.8.
|t User Reports --
|g Appendix 1
|t Setting up Organisational Details --
|g Appendix 2
|t Set up the Administrator --
|g Appendix 3
|t Audit Reports --
|g Appendix 4
|t Manage Users --
|g Appendix 5
|t Manage Manufacturers --
|g Appendix 6
|t Manage Suppliers --
|g Appendix 7
|t Manage Clients --
|g Appendix 8
|t Manage Investigators --
|g Appendix 9
|t Manage Disks --
|g Appendix 10
|t Manage Tapes --
|g Appendix 11
|t Manage Small Digital Media --
|g Appendix 12
|t Exhibit Details --
|g Appendix 13
|t Evidence Sought --
|g Appendix 14
|t Estimates --
|g Appendix 15
|t Accept or Reject Case --
|g Appendix 16
|t Movement Log --
|g Appendix 17
|t Examination Log --
|g Appendix 18
|t Computer Hardware Details --
|g Appendix 19
|t Non-Computer Exhibit Details --
|g Appendix 20
|t Hard Disk Details --
|g Appendix 21
|t Other Media Details --
|g Appendix 22
|t Work Record Details --
|g Appendix 23
|t Updating Case Estimates --
|g Appendix 24
|t Create Exhibit --
|g Appendix 25
|t Case Result --
|g Appendix 26
|t Case Backup --
|g Appendix 27
|t Billing and Feedback --
|g Appendix 28
|t Feedback Received --
|g Appendix 29
|t Organization Report --
|g Appendix 30
|t Users Report --
|g Appendix 31
|t Manufacturers Report --
|g Appendix 32
|t Supplier Report --
|g Appendix 33
|t Clients Report --
|g Appendix 34
|t Investigator's Report --
|g Appendix 35
|t Disks by Assignment Report --
|g Appendix 36
|t Disks by Reference Number Report --
|g Appendix 37
|t Wiped Disks Report --
|g Appendix 38
|t Disposed Disks Report --
|g Appendix 39
|t Disk History Report --
|g Appendix 40
|t Tapes by Assignment Report --
|g Appendix 41
|t Tapes by Reference Number Report --
|g Appendix 42
|t Wiped Tapes Report --
|g Appendix 43
|t Disposed Tapes Report --
|g Appendix 44
|t Tape History Report --
|g Appendix 45
|t Small Digital Media by Assignment Report --
|g Appendix 46
|t Small Digital Media by Reference Number Report --
|g Appendix 47
|t Wiped Small Digital Media Report --
|g Appendix 48
|t Disposed Small Digital Media Report --
|g Appendix 49
|t Small Digital Media History Report --
|g Appendix 50
|t Wipe Methods Report --
|g Appendix 51
|t Disposal Methods Report --
|g Appendix 52
|t Imaging Methods Report --
|g Appendix 53
|t Operating Systems Report --
|g Appendix 54
|t Media Types Report --
|g Appendix 55
|t Exhibit Type Report --
|g Appendix 56
|t Case Setup Details Report --
|g Appendix 57
|t Case Movement Report --
|g Appendix 58
|t Case Computers Report --
|g Appendix 59
|t Case Non-Computer Evidence Report --
|g Appendix 60
|t Case Disks Received Report --
|g Appendix 61
|t Case Other Media Received --
|g Appendix 62
|t Case Exhibits Received Report --
|g Appendix 63
|t Case Work Record --
|g Appendix 64
|t Cases Rejected Report --
|g Appendix 65
|t Cases Accepted --
|g Appendix 66
|t Case Estimates Report --
|g Appendix 67
|t Cases by Forensic Analyst --
|g Appendix 68
|t Cases by Client Report --
|g Appendix 69
|t Cases by Investigator Report --
|g Appendix 70
|t Case Target Dates Report --
|g Appendix 71
|t Cases Within "x" Days of Target Date Report --
|g Appendix 72
|t Cases Past Target Date Report --
|g Appendix 73
|t Cases Unassigned Report --
|g Appendix 74
|t Case Exhibits Produced Report --
|g Appendix 75
|t Case Results Report --
|g Appendix 76
|t Case Backups Report --
|g Appendix 77
|t Billing Run Report --
|g Appendix 78
|t Feedback Letters --
|g Appendix 79
|t Feedback Forms Printout --
|g Appendix 80
|t Feedback Reporting Summary by Case --
|g Appendix 81
|t Feedback Reporting Summary by Forensic Analyst --
|g Appendix 82
|t Feedback Reporting Summary by Client --
|g Appendix 83
|t Complete Case Report --
|g Appendix 84
|t Processed Report --
|g Appendix 85
|t Insurance Report --
|g 11.
|t Evidence Presentation --
|g 11.1.
|t Overview --
|g 11.2.
|t Notes --
|g 11.3.
|t Evidence --
|g 11.4.
|t Types of Witness --
|g 11.5.
|t Reports --
|g 11.6.
|t Testimony in Court --
|g 11.7.
|t Why Cases Fail --
|g Appendix 1
|t Nations Ratifying the Budapest Convention --
|g Appendix 2
|t Criteria for Selection an Expert Witness --
|g Appendix 3
|t The Forensic Laboratory Code of Conduct for Expert Witnesses --
|g Appendix 4
|t Report Writing Checklist --
|g Appendix 5
|t Statement and Deposition Writing Checklist --
|g Appendix 6
|t Non-Verbal Communication to Avoid --
|g Appendix 7
|t Etiquette in Court --
|g Appendix 8
|t Testimony Feedback Form --
|g 12.
|t Secure Working Practices --
|g 12.1.
|t Introduction --
|g 12.2.
|t Principles of Information Security within the Forensic Laboratory --
|g 12.3.
|t Managing Information Security in the Forensic Laboratory --
|g 12.4.
|t Physical Security in the Forensic Laboratory --
|g 12.5.
|t Managing Service Delivery --
|g 12.6.
|t Managing System Access --
|g 12.7.
|t Managing Information on Public Systems --
|g 12.8.
|t Securely Managing IT Systems --
|g 12.9.
|t Information Processing Systems Development and Maintenance --
|g Appendix 1
|t The Forensic Laboratory SoA --
|g Appendix 2
|t Meeting the Requirements of GAISP --
|g Appendix 3
|t Software License Database Information Held --
|g Appendix 4
|t Information Security Manager, Job Description --
|g Appendix 5
|t Logon Banner --
|g Appendix 6
|t The Forensic Laboratory's Security Objectives --
|g Appendix 7
|t Asset Details to be Recorded in the Asset Register --
|g Appendix 8
|t Details Required for Removal of an Asset --
|g Appendix 9
|t Handling Classified Assets --
|g Appendix 10
|t Asset Disposal Form --
|g Appendix 11
|t Visitor Checklist --
|g Appendix 12
|t Rules of the Data Center --
|g Appendix 13
|t User Account Management Form Contents --
|g Appendix 14
|t Teleworking Request Form Contents --
|g 13.
|t Ensuring Continuity of Operations --
|g 13.1.
|t Business Justification for Ensuring Continuity of Operations --
|g 13.2.
|t Management Commitment --
|g 13.3.
|t Training and Competence --
|g 13.4.
|t Determining the Business Continuity Strategy --
|g 13.5.
|t Developing and Implementing a Business Continuity Management Response --
|g 13.6.
|t Exercising, Maintaining, and Reviewing Business Continuity
|
505 |
0 |
0 |
|t Arrangements --
|g 13.7.
|t Maintaining and Improving the BCMS --
|g 13.8.
|t Embedding Business Continuity Forensic Laboratory Processes --
|g 13.9.
|t BCMS Documentation and Records -- General --
|g Appendix 1
|t Supplier Details Held --
|g Appendix 2
|t Headings for Financial and Security Questionnaire --
|g Appendix 3
|t Business Continuity Manager, Job Description --
|g Appendix 4
|t Contents of the Forensic Laboratory BIA Form --
|g Appendix 5
|t Proposed BCMS Development and Certification Timescales --
|g Appendix 6
|t Incident Scenarios --
|g Appendix 7
|t Strategy Options --
|g Appendix 8
|t Standard Forensic Laboratory BCP Contents --
|g Appendix 9
|t Table of Contents to the Appendix to a BCP --
|g Appendix 10
|t BCP Change List Contents --
|g Appendix 11
|t BCP Scenario Plan Contents --
|g Appendix 12
|t BCP Review Report Template Contents --
|g Appendix 13
|t Mapping IMS Procedures to ISO 22301 --
|g Appendix 14
|t Differences between ISO 22301 and BS 25999 --
|g 14.
|t Managing Business Relationships --
|g 14.1.
|t The Need for Third Parties --
|g 14.2.
|t Clients --
|g 14.3.
|t Third Parties Accessing the Forensic Laboratory.
|
505 |
0 |
0 |
|g Note continued:
|g 14.4.
|t Managing Service Level Agreements --
|g 14.5.
|t Suppliers of Office and IT Products and Services --
|g 14.6.
|t Utility Service Providers --
|g 14.7.
|t Contracted Forensic Consultants and Expert Witnesses --
|g 14.8.
|t Outsourcing --
|g 14.9.
|t Use of Sub-Contractors --
|g 14.10.
|t Managing Complaints --
|g 14.11.
|t Reasons for Outsourcing Failure --
|g Appendix 1
|t Contents of a Service Plan --
|g Appendix 2
|t Risks to Consider with Third Parties --
|g Appendix 3
|t Contract Checklist for Information Security Issues --
|g Appendix 4
|t SLA Template for Products and Services for Clients --
|g Appendix 5
|t RFx Descriptions --
|g Appendix 6
|t The Forensic Laboratory RFx Template Checklist --
|g Appendix 7
|t RFx Timeline for Response, Evaluation, and Selection --
|g Appendix 8
|t Forensic Consultant's Personal Attributes --
|g Appendix 9
|t Some Tips for Selecting an Outsourcing Service Provider --
|g Appendix 10
|t Areas to Consider for Outsourcing Contracts --
|g 15.
|t Effective Records Management --
|g 15.1.
|t Introduction --
|g 15.2.
|t Legislative, Regulatory, and Other Requirements --
|g 15.3.
|t Record Characteristics --
|g 15.4.
|t A Records Management Policy --
|g 15.5.
|t Defining the Requirements for Records Management in the Forensic Laboratory --
|g 15.6.
|t Determining Forensic Laboratory Records to be Managed by the ERMS --
|g 15.7.
|t Using Metadata in the Forensic Laboratory --
|g 15.8.
|t Record Management Procedures --
|g 15.9.
|t Business Continuity --
|g Appendix 1
|t MoReq2 Functional Requirements --
|g Appendix 2
|t Mapping of ISO 15489 Part 1 to Forensic Laboratory Procedures --
|g Appendix 3
|t Types of Legislation and Regulation that will Affect Record Keeping --
|g Appendix 4
|t Forensic Laboratory Record Keeping Policy --
|g Appendix 5
|t Record Management System Objectives --
|g Appendix 6
|t Business Case Contents --
|g Appendix 7
|t Outline of the ERMS Project --
|g Appendix 8
|t Selection Criteria for an ERMS --
|g Appendix 9
|t Initial ERMS Feedback Questionnaire --
|g Appendix 10
|t Metadata Required in the ERMS --
|g Appendix 11
|t Sample E-mail Metadata --
|g Appendix 12
|t Forensic Case Records Stored in the ERMS --
|g Appendix 13
|t Dublin Core Metadata Elements --
|g Appendix 14
|t National Archives of Australia Metadata Standard --
|g Appendix 15
|t Responsibilities for Records Management in the Forensic Laboratory --
|g Appendix 16
|t Metadata for Records Stored Off-Site --
|g Appendix 17
|t Records Classification System --
|g Appendix 18
|t Disposition Authorization --
|g Appendix 19
|t Additional Requirements for Physical Record Recovery --
|g Appendix 20
|t Specialized Equipment Needed for Inspection and Recovery of Damaged Records --
|g 16.
|t Performance Assessment --
|g 16.1.
|t Overview --
|g 16.2.
|t Performance Assessment --
|g 17.
|t Health and Safety Procedures --
|g 17.1.
|t General --
|g 17.2.
|t Planning for OH & S --
|g 17.3.
|t Implementation and Operation of the OH & S Management System --
|g 17.4.
|t Checking Compliance with OH & S Requirements --
|g 17.5.
|t Improving the OH & S Management System --
|g Appendix 1
|t OH & S Policy Checklist --
|g Appendix 2
|t The Forensic Laboratory OH & S Policy --
|g Appendix 3
|t Health and Safety Manager Job Description --
|g Appendix 4
|t Some Examples of OH & S Drivers --
|g Appendix 5
|t The Forensic Laboratory OH & S Objectives --
|g Appendix 6
|t Sample Hazards in the Forensic Laboratory --
|g Appendix 7
|t Hazard Identification Form --
|g Appendix 8
|t Some Areas for Inspection for Hazards --
|g Appendix 9
|t Inputs to the Risk Assessment Process --
|g Appendix 10
|t OH & S Risk Rating --
|g Appendix 11
|t DSE Initial Workstation Self-Assessment Checklist --
|g Appendix 12
|t DSE Training Syllabus --
|g Appendix 13
|t DSE Assessors Checklist --
|g Appendix 14
|t Measurement of OH & S Success --
|g Appendix 15
|t Specific OH & S Incident Reporting Requirements --
|g Appendix 16
|t OH & S Investigation Checklist and Form Contents --
|g Appendix 17
|t OH & S Incident Review --
|g Appendix 18
|t OHSAS 18001 Mapping to IMS Procedures --
|g 18.
|t Human Resources --
|g 18.1.
|t Employee Development --
|g 18.2.
|t Development --
|g 18.3.
|t Termination --
|g Appendix 1
|t Training Feedback Form --
|g Appendix 2
|t Employee Security Screening Policy Checklist --
|g Appendix 3
|t Employment Application Form --
|g Appendix 4
|t Employment Application Form Notes --
|g Appendix 5
|t Some Documents that can Verify Identity --
|g Appendix 6
|t Document Authenticity Checklist --
|g Appendix 7
|t Verifying Addresses --
|g Appendix 8
|t Right to Work Checklist --
|g Appendix 9
|t Reference Authorization --
|g Appendix 10
|t Statutory Declaration --
|g Appendix 11
|t Employer Reference Form --
|g Appendix 12
|t Employer's Oral Reference Form --
|g Appendix 13
|t Confirmation of an Oral Reference Letter --
|g Appendix 14
|t Qualification Verification Checklist --
|g Appendix 15
|t Criminal Record Declaration Checklist --
|g Appendix 16
|t Personal Reference Form --
|g Appendix 17
|t Personal Oral Reference Form --
|g Appendix 18
|t Other Reference Form --
|g Appendix 19
|t Other Reference Form --
|g Appendix 20
|t Employee Security Screening File --
|g Appendix 21
|t Top Management Acceptance of Employment Risk --
|g Appendix 22
|t Third-Party Employee Security Screening Provider Checklist --
|g Appendix 23
|t Recruitment Agency Contract Checklist --
|g Appendix 24
|t Investigation Manager, Job Description --
|g Appendix 25
|t Forensic Laboratory System Administrator, Job Description --
|g Appendix 26
|t Employee, Job Description --
|g Appendix 27
|t Areas of Technical Competence --
|g Appendix 28
|t Some Professional Forensic and Security Organizations --
|g Appendix 29
|t Training Specification Template --
|g Appendix 30
|t Training Proposal Evaluation Checklist --
|g Appendix 31
|t Training Supplier Interview and Presentation Checklist --
|g Appendix 32
|t Training Reaction Level Questionnaire --
|g Appendix 33
|t The Forensic Laboratory Code of Ethics --
|g Appendix 34
|t Termination Checklist --
|g 19.
|t Accreditation and Certification for a Forensic Laboratory --
|g 19.1.
|t Accreditation and Certification --
|g 19.2.
|t Accreditation for a Forensic Laboratory --
|g 19.3.
|t Certification for a Forensic Laboratory --
|g Appendix 1
|t Typical Conditions of Accreditation --
|g Appendix 2
|t Contents of an Audit Response --
|g Appendix 3
|t Management System Assessment Non-Conformance Examples --
|g Appendix 4
|t Typical Closeout Periods --
|g 20.
|t Emerging Issues --
|g 20.1.
|t Introduction --
|g 20.2.
|t Specific Challenges.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Evidence preservation
|x Standards.
|
650 |
|
0 |
|a Forensic sciences
|x Standards.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Electronic data processing.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Preuve (Droit pénal)
|x Conservation
|x Normes.
|
650 |
|
6 |
|a Criminalistique
|x Normes.
|
650 |
|
6 |
|a Informatique.
|
650 |
|
7 |
|a computer science.
|2 aat
|
650 |
|
7 |
|a data processing.
|2 aat
|
650 |
|
7 |
|a Electronic data processing
|2 fast
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer science
|2 fast
|
700 |
1 |
|
|a Jones, Andrew.
|
776 |
0 |
8 |
|i Print version:
|z 9781597497428
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1115161
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25553690
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10755369
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26099257
|
994 |
|
|
|a 92
|b IZTAP
|