|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn922903824 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
151017s2013 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d DEBSZ
|d OCLCQ
|d IDB
|d OCLCO
|d OCLCF
|d MERUC
|d OCLCQ
|d OCLCO
|d ZCU
|d ICG
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9780471789321
|q (paperback)
|
020 |
|
|
|a 0471789321
|q (paperback)
|
029 |
1 |
|
|a DEBBG
|b BV044154510
|
029 |
1 |
|
|a DEBSZ
|b 449241319
|
035 |
|
|
|a (OCoLC)922903824
|
050 |
|
4 |
|a HV8079.C65 .S44 2013
|
082 |
0 |
4 |
|a 363.25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sheetz, Michael.
|
245 |
1 |
0 |
|a Computer Forensics :
|b an Essential Guide for Accountants, Lawyers, and Managers.
|
260 |
|
|
|a Somerset :
|b Wiley,
|c 2013.
|
300 |
|
|
|a 1 online resource (352 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a ""Cover ""; ""Title Page ""; ""Copyright ""; ""Contents ""; ""Introduction ""; ""Acknowledgments ""; ""Chapter 1 A Definition of Computer Forensics ""; ""Introduction ""; ""Forensic Science ""; ""History of Computer Forensics ""; ""World Wide Web ""; ""Hacker Community ""; ""Conclusion ""; ""Notes ""
|
505 |
8 |
|
|a ""Suggested Reading """"Chapter 2 Basics of Computer Forensic Concepts ""; ""Introduction ""; ""Understanding Digital Evidence ""; ""Input ""; ""Storage ""; ""Processing ""; ""What Computer Data Is ""; ""Output ""; ""Conclusion ""; ""Notes ""; ""Suggested Reading ""
|
505 |
8 |
|
|a ""Chapter 3 Preservation and Collection of Digital Evidence """"Introduction ""; ""Rules of Evidence ""; ""Preservation ""; ""Collection ""; ""Conclusion ""; ""Note ""; ""Suggested Reading ""; ""Chapter 4 Analysis of Digital Evidence ""; ""Introduction ""; ""Forensic Analysis ""; ""Conclusion ""
|
505 |
8 |
|
|a ""Notes """"Suggested Reading ""; ""Chapter 5 Reporting and Rendering the Opinion ""; ""Introduction ""; ""Preparing the Report ""; ""Photographic Documentation ""; ""Reporting ""; ""Executive Summary or Abstract ""; ""Table of Contents ""; ""Body or Findings ""; ""Conclusion ""
|
505 |
8 |
|
|a ""Supporting Documents """"Appendixes ""; ""Presentation ""; ""Trial Process ""; ""Dispute ""; ""Complaint ""; ""Service of Process ""; ""Pretrial ""; ""Trial ""; ""Conclusion ""; ""Suggested Reading ""; ""Chapter 6 Computer Attacks ""; ""Hackers and Phreakz Oh My ""
|
500 |
|
|
|a ""Hackers: Unauthorized Use and Trespassing ""
|
520 |
|
|
|a Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. Th.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Sheetz, Michael.
|t Computer Forensics : An Essential Guide for Accountants, Lawyers, and Managers.
|d Somerset : Wiley, ©2013
|z 9780471789321
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=694238
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL694238
|
994 |
|
|
|a 92
|b IZTAP
|