Description |
1 online resource (xxv, 404 pages) : illustrations |
Bibliography |
Includes bibliographical references (pages 397-398) and index. |
Contents |
Computer forensic investigation basics -- Policies, standards, laws, and legal processes -- Computer forensic examination categories -- Computer, internet, and electronic crimes -- Computers, electronics, and networking environment -- Investigative tools, technical training, and forensic equipment -- Managing the crime/incident scene -- Investigating computer center incidents -- Computer systems disk and file structures -- The computer and electronic forensic lab -- Extracting computer and electronic evidence -- E-mail and internet investigations -- Mobile phone and PDA investigations -- Court preparation, presentations, and testimony. |
Access |
Use copy Restrictions unspecified star MiAaHDL |
Reproduction |
Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL |
System Details |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
Processing Action |
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Access |
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK). WlAbNL |
Terms Of Use |
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. WlAbNL |
Summary |
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation. |
Language |
English. |
Subject |
Evidence, Expert -- United States.
|
|
Computer crimes -- Investigation -- United States.
|
|
Expertises -- États-Unis. |
|
Criminalité informatique -- Enquêtes -- États-Unis. |
|
Computer crimes -- Investigation |
|
Evidence, Expert |
|
United States |
|
Expertises -- États-Unis. |
|
Criminalité informatique -- Enquêtes -- États-Unis. |
|
sécurité informatique. |
|
criminalité informatique -- Internet -- sécurité informatique. |
|
criminalité informatique -- réseau informatique -- sécurité informatique. |
Other Form: |
Print version: Newman, Robert C. Computer forensics. Boca Raton, FL : Auerbach Publications, ©2007 (DLC) 2006031576 (OCoLC)74964010 |
ISBN |
9780849305627 |
|
0849305624 |
|
9781466524859 (e-book) |
|
1466524855 |
|
(alk. paper) |
|
(alk. paper) |
|
0429135041 |
|
9780429135040 |
Standard No. |
10.1201/9780849305627 doi |
|