Cargando…

Computer Forensics : an Essential Guide for Accountants, Lawyers, and Managers.

Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, Ame...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sheetz, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Somerset : Wiley, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn922903824
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 151017s2013 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d DEBSZ  |d OCLCQ  |d IDB  |d OCLCO  |d OCLCF  |d MERUC  |d OCLCQ  |d OCLCO  |d ZCU  |d ICG  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
020 |a 9780471789321  |q (paperback) 
020 |a 0471789321  |q (paperback) 
029 1 |a DEBBG  |b BV044154510 
029 1 |a DEBSZ  |b 449241319 
035 |a (OCoLC)922903824 
050 4 |a HV8079.C65 .S44 2013 
082 0 4 |a 363.25 
049 |a UAMI 
100 1 |a Sheetz, Michael. 
245 1 0 |a Computer Forensics :  |b an Essential Guide for Accountants, Lawyers, and Managers. 
260 |a Somerset :  |b Wiley,  |c 2013. 
300 |a 1 online resource (352 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a ""Cover ""; ""Title Page ""; ""Copyright ""; ""Contents ""; ""Introduction ""; ""Acknowledgments ""; ""Chapter 1 A Definition of Computer Forensics ""; ""Introduction ""; ""Forensic Science ""; ""History of Computer Forensics ""; ""World Wide Web ""; ""Hacker Community ""; ""Conclusion ""; ""Notes "" 
505 8 |a ""Suggested Reading """"Chapter 2 Basics of Computer Forensic Concepts ""; ""Introduction ""; ""Understanding Digital Evidence ""; ""Input ""; ""Storage ""; ""Processing ""; ""What Computer Data Is ""; ""Output ""; ""Conclusion ""; ""Notes ""; ""Suggested Reading "" 
505 8 |a ""Chapter 3 Preservation and Collection of Digital Evidence """"Introduction ""; ""Rules of Evidence ""; ""Preservation ""; ""Collection ""; ""Conclusion ""; ""Note ""; ""Suggested Reading ""; ""Chapter 4 Analysis of Digital Evidence ""; ""Introduction ""; ""Forensic Analysis ""; ""Conclusion "" 
505 8 |a ""Notes """"Suggested Reading ""; ""Chapter 5 Reporting and Rendering the Opinion ""; ""Introduction ""; ""Preparing the Report ""; ""Photographic Documentation ""; ""Reporting ""; ""Executive Summary or Abstract ""; ""Table of Contents ""; ""Body or Findings ""; ""Conclusion "" 
505 8 |a ""Supporting Documents """"Appendixes ""; ""Presentation ""; ""Trial Process ""; ""Dispute ""; ""Complaint ""; ""Service of Process ""; ""Pretrial ""; ""Trial ""; ""Conclusion ""; ""Suggested Reading ""; ""Chapter 6 Computer Attacks ""; ""Hackers and Phreakz Oh My "" 
500 |a ""Hackers: Unauthorized Use and Trespassing "" 
520 |a Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. Th. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer crimes  |x Investigation. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Computer crimes  |x Investigation  |2 fast 
776 0 8 |i Print version:  |a Sheetz, Michael.  |t Computer Forensics : An Essential Guide for Accountants, Lawyers, and Managers.  |d Somerset : Wiley, ©2013  |z 9780471789321 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=694238  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL694238 
994 |a 92  |b IZTAP