Cargando…

Computer forensics : evidence collection and management /

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networkin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Newman, Robert C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : Auerbach Publications, ©2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn682184413
003 OCoLC
005 20231017213018.0
006 m o d
007 cr bn||||||abp
007 cr bn||||||ada
008 101117s2007 flua ob 001 0 eng d
040 |a OCLCE  |b eng  |e pn  |c OCLCE  |d OCLCQ  |d OCLCO  |d OCLCF  |d IDEBK  |d OCLCQ  |d UKMGB  |d NLW  |d OCLCQ  |d UKAHL  |d STF  |d UAB  |d OCLCQ  |d OCLCO  |d SFB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB7C7309  |2 bnb 
016 7 |a 018428749  |2 Uk 
019 |a 664765642  |a 755291454  |a 1118336465  |a 1124548138  |a 1144877998  |a 1162504383  |a 1229132617 
020 |a 9780849305627 
020 |a 0849305624 
020 |a 9781466524859  |q (e-book) 
020 |a 1466524855 
020 |z 9780849305610  |q (alk. paper) 
020 |z 0849305616  |q (alk. paper) 
020 |a 0429135041 
020 |a 9780429135040 
024 7 |a 10.1201/9780849305627  |2 doi 
029 1 |a AU@  |b 000065194542 
029 1 |a AU@  |b 000068857324 
029 1 |a UKMGB  |b 018428749 
029 1 |a AU@  |b 000070345451 
035 |a (OCoLC)682184413  |z (OCoLC)664765642  |z (OCoLC)755291454  |z (OCoLC)1118336465  |z (OCoLC)1124548138  |z (OCoLC)1144877998  |z (OCoLC)1162504383  |z (OCoLC)1229132617 
037 |a TANDF_183150  |b Ingram Content Group 
042 |a dlr 
043 |a n-us--- 
050 4 |a KF8961  |b .N49 2007 
072 7 |a LAW  |x 041000  |2 bisacsh 
082 0 4 |a 345.73/0268  |2 22 
049 |a UAMI 
100 1 |a Newman, Robert C. 
245 1 0 |a Computer forensics :  |b evidence collection and management /  |c Robert C. Newman. 
260 |a Boca Raton, FL :  |b Auerbach Publications,  |c ©2007. 
300 |a 1 online resource (xxv, 404 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 397-398) and index. 
505 0 |a Computer forensic investigation basics -- Policies, standards, laws, and legal processes -- Computer forensic examination categories -- Computer, internet, and electronic crimes -- Computers, electronics, and networking environment -- Investigative tools, technical training, and forensic equipment -- Managing the crime/incident scene -- Investigating computer center incidents -- Computer systems disk and file structures -- The computer and electronic forensic lab -- Extracting computer and electronic evidence -- E-mail and internet investigations -- Mobile phone and PDA investigations -- Court preparation, presentations, and testimony. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
588 0 |a Print version record. 
506 1 |a Legal Deposit;  |c Only available on premises controlled by the deposit library and to one user at any one time;  |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).  |5 WlAbNL 
540 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.  |5 WlAbNL 
520 3 |a Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Evidence, Expert  |z United States. 
650 0 |a Computer crimes  |x Investigation  |z United States. 
650 6 |a Expertises  |z États-Unis. 
650 6 |a Criminalité informatique  |x Enquêtes  |z États-Unis. 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Evidence, Expert  |2 fast 
651 7 |a United States  |2 fast 
650 7 |a Expertises  |z États-Unis.  |2 ram 
650 7 |a Criminalité informatique  |x Enquêtes  |z États-Unis.  |2 ram 
650 7 |a sécurité informatique.  |2 rero 
650 7 |a criminalité informatique  |x Internet  |x sécurité informatique.  |2 rero 
650 7 |a criminalité informatique  |x réseau informatique  |x sécurité informatique.  |2 rero 
776 0 8 |i Print version:  |a Newman, Robert C.  |t Computer forensics.  |d Boca Raton, FL : Auerbach Publications, ©2007  |w (DLC) 2006031576  |w (OCoLC)74964010 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780849305627/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH15089196 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis30547465 
994 |a 92  |b IZTAP