語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer forensics : = an essential ...
~
Sheetz, Michael.
Computer forensics : = an essential guide for accountants, lawyers, and managers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Computer forensics :/ Michael Sheetz.
其他題名:
an essential guide for accountants, lawyers, and managers /
作者:
Sheetz, Michael.
出版者:
Hoboken, N.J. :John Wiley & Sons, Inc., : c2007.,
面頁冊數:
xvii, 152 p. ;24 cm.;
標題:
Computer crimes - Investigation. -
電子資源:
http://www.loc.gov/catdir/toc/ecip071/2006030331.html
電子資源:
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-b.html
電子資源:
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-d.html
ISBN:
0471789321
Computer forensics : = an essential guide for accountants, lawyers, and managers /
Sheetz, Michael.
Computer forensics :
an essential guide for accountants, lawyers, and managers /Michael Sheetz. - Hoboken, N.J. :John Wiley & Sons, Inc.,c2007. - xvii, 152 p. ;24 cm.
Includes bibliographical references and index.
A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
ISBN: 0471789321
LCCN: 2006030331Subjects--Topical Terms:
563858
Computer crimes
--Investigation.
LC Class. No.: HV8079.C65 / S44 2007
Dewey Class. No.: 363.25
Computer forensics : = an essential guide for accountants, lawyers, and managers /
LDR
:02509cam# 00002534a 4500
001
637513
005
20071209153840.0
008
100129s2007 nju b 001 0 eng
010
$a
2006030331
020
$a
0471789321
020
$a
9780471789321 (hbk.) :
$c
US50.00
035
$a
2006030331
040
$a
DLC
$c
DLC
$c
NFU
$d
DLC
$d
NFU
041
$a
eng
042
$a
pcc
050
0 0
$a
HV8079.C65
$b
S44 2007
082
0 0
$2
22
$a
363.25
100
1
$a
Sheetz, Michael.
$3
700587
245
1 0
$a
Computer forensics :
$b
an essential guide for accountants, lawyers, and managers /
$c
Michael Sheetz.
260
$a
Hoboken, N.J. :
$c
c2007.
$b
John Wiley & Sons, Inc.,
300
$a
xvii, 152 p. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
650
0
$a
Computer crimes
$x
Investigation.
$3
563858
856
4 1
$3
Table of contents only
$u
http://www.loc.gov/catdir/toc/ecip071/2006030331.html
856
4 2
$3
Contributor biographical information
$u
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-b.html
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-d.html
筆 0 讀者評論
全部
圖書館3F 書庫
館藏
2 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
E027950
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
363.25 S541 2007
一般使用(Normal)
在架
0
預約
E032705
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
363.25 S541 2007 c.2
一般使用(Normal)
在架
0
預約
2 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入