|
|
|
|
LEADER |
00000nam a2200000 a 4500 |
001 |
ELB178923 |
003 |
FINmELB |
005 |
20200520144314.0 |
006 |
m o d | |
007 |
cr cn||||||||| |
008 |
060912s2007 nju sb 001 0 eng d |
010 |
|
|
|z 2006030331
|
020 |
|
|
|z 9780471789321 (cloth)
|
020 |
|
|
|z 0471789321 (cloth)
|
020 |
|
|
|a 9780470124024 (electronic bk.)
|
035 |
|
|
|a (OCoLC)71800482
|
040 |
|
|
|a FINmELB
|c FINmELB
|d FINmELB
|
050 |
|
4 |
|a HV8079.C65
|b S44 2007
|
082 |
0 |
4 |
|a 363.25
|2 22
|
100 |
1 |
|
|a Sheetz, Michael.
|
245 |
1 |
0 |
|a Computer forensics
|h [electronic resource] :
|b an essential guide for accountants, lawyers, and managers /
|c Michael Sheetz.
|
260 |
|
|
|a Hoboken, N.J. :
|b John Wiley & Sons, Inc.,
|c c2007.
|
300 |
|
|
|a xvii, 152 p.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
|
588 |
|
|
|a Description based on metadata supplied by the publisher and other sources.
|
590 |
|
|
|a Electronic reproduction. Santa Fe, Arg.: elibro, 2022. Available via World Wide Web. Access may be limited to eLibro affiliated libraries.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
655 |
|
4 |
|a Electronic books.
|
797 |
2 |
|
|a elibro, Corp.
|
856 |
4 |
0 |
|u https://elibro.uam.elogim.com/ereader/bidiuam/178923
|z Texto completo
|
950 |
|
|
|a eLibro English
|