Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Computer forensics : = an essential ...
~
Sheetz, Michael.
Computer forensics : = an essential guide for accountants, lawyers, and managers /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Computer forensics :/ Michael Sheetz.
Reminder of title:
an essential guide for accountants, lawyers, and managers /
Author:
Sheetz, Michael.
Published:
Hoboken, N.J. :John Wiley & Sons, Inc., : c2007.,
Description:
xvii, 152 p. ;24 cm.;
Subject:
Computer crimes - Investigation. -
Online resource:
http://www.loc.gov/catdir/toc/ecip071/2006030331.html
Online resource:
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-b.html
Online resource:
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-d.html
ISBN:
0471789321
Computer forensics : = an essential guide for accountants, lawyers, and managers /
Sheetz, Michael.
Computer forensics :
an essential guide for accountants, lawyers, and managers /Michael Sheetz. - Hoboken, N.J. :John Wiley & Sons, Inc.,c2007. - xvii, 152 p. ;24 cm.
Includes bibliographical references and index.
A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
ISBN: 0471789321
LCCN: 2006030331Subjects--Topical Terms:
563858
Computer crimes
--Investigation.
LC Class. No.: HV8079.C65 / S44 2007
Dewey Class. No.: 363.25
Computer forensics : = an essential guide for accountants, lawyers, and managers /
LDR
:02509cam# 00002534a 4500
001
637513
005
20071209153840.0
008
100129s2007 nju b 001 0 eng
010
$a
2006030331
020
$a
0471789321
020
$a
9780471789321 (hbk.) :
$c
US50.00
035
$a
2006030331
040
$a
DLC
$c
DLC
$c
NFU
$d
DLC
$d
NFU
041
$a
eng
042
$a
pcc
050
0 0
$a
HV8079.C65
$b
S44 2007
082
0 0
$2
22
$a
363.25
100
1
$a
Sheetz, Michael.
$3
700587
245
1 0
$a
Computer forensics :
$b
an essential guide for accountants, lawyers, and managers /
$c
Michael Sheetz.
260
$a
Hoboken, N.J. :
$c
c2007.
$b
John Wiley & Sons, Inc.,
300
$a
xvii, 152 p. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
650
0
$a
Computer crimes
$x
Investigation.
$3
563858
856
4 1
$3
Table of contents only
$u
http://www.loc.gov/catdir/toc/ecip071/2006030331.html
856
4 2
$3
Contributor biographical information
$u
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-b.html
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0740/2006030331-d.html
based on 0 review(s)
ALL
圖書館3F 書庫
Items
2 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
E027950
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
363.25 S541 2007
一般使用(Normal)
On shelf
0
Reserve
E032705
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
363.25 S541 2007 c.2
一般使用(Normal)
On shelf
0
Reserve
2 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login