|
|
|
|
LEADER |
00000nam a22000003a 4500 |
001 |
ebs555560e |
003 |
EBZ |
006 |
m o d |||||| |
007 |
cr|unu|||||||| |
008 |
060912s2007 nju ob 001 0 eng |
020 |
|
|
|z 9780471789321
|
020 |
|
|
|a 9780470124024 (online)
|
020 |
|
|
|a 9781119120278 (online)
|
020 |
|
|
|a 9781119202011 (online)
|
020 |
|
|
|a 9781299634077 (online)
|
035 |
|
|
|a (EBZ)ebs555560e
|
040 |
|
|
|a DLC
|d EBZ
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a HV8079.C65
|b S44 2007
|
100 |
1 |
|
|a Sheetz, Michael.
|
245 |
1 |
0 |
|a Computer forensics
|h [electronic resource] :
|b an essential guide for accountants, lawyers, and managers /
|c Michael Sheetz.
|
246 |
2 |
|
|a Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers
|
260 |
|
|
|a Hoboken, N.J. :
|b John Wiley & Sons, Inc.,
|c c2007.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
773 |
0 |
|
|t ProQuest Ebook Central - Academic Complete
|d ProQuest Info & Learning Co
|
776 |
1 |
|
|t Computer forensics
|w (DLC)2006030331
|
856 |
4 |
0 |
|y Access Content Online(from ProQuest Ebook Central - Academic Complete)
|u https://ezproxy.msu.edu/login?url=https://ebookcentral.proquest.com/lib/michstate-ebooks/detail.action?docID=694238
|z ProQuest Ebook Central - Academic Complete: 2007
|