Investigative Computer Forensics : the Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.

Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marrie...

Full description

Saved in:
Bibliographic Details
Online Access: Full text (MCPHS users only)
Main Author: Laykin, Erik
Format: Electronic eBook
Language:English
Published: Chichester : Wiley, 2013
Subjects:
Local Note:ProQuest Ebook Central

MARC

LEADER 00000cam a2200000ui 4500
001 in00000182219
006 m o d
007 cr |n|---|||||
008 130418s2013 xx o 000 0 eng d
005 20240702200335.3
010 |a  2012043301 
019 |a 1162049939 
020 |a 9781118221419 
020 |a 1118221419 
020 |a 1299464882 
020 |a 9781299464889 
020 |a 1118572114 
020 |a 9781118572115 
020 |a 1118235223 
020 |a 9781118235225 
029 1 |a AU@  |b 000060069972 
029 1 |a DEBBG  |b BV041912917 
029 1 |a DEBBG  |b BV044159689 
029 1 |a DEBSZ  |b 397177690 
029 1 |a DEBSZ  |b 423171151 
029 1 |a DEBSZ  |b 449272370 
035 |a (OCoLC)841904569  |z (OCoLC)1162049939 
035 |a (OCoLC)ocn841904569 
040 |a MHW  |b eng  |e pn  |c MHW  |d IDEBK  |d MEAUC  |d DEBSZ  |d YDXCP  |d S9I  |d U3W  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d DEBBG  |d COO  |d CEF  |d CNNOR  |d ICG  |d OCLCQ  |d UAB  |d DKC  |d OCLCQ  |d UKAHL  |d VLY  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
050 4 |a HV8079.C65 L395 2013 
082 0 4 |a 363.25/968  |a 363.25968 
100 1 |a Laykin, Erik. 
245 1 0 |a Investigative Computer Forensics :  |b the Practical Guide for Lawyers, Accountants, Investigators, and Business Executives. 
260 |a Chichester :  |b Wiley,  |c 2013. 
300 |a 1 online resource (435 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover; Title Page; Copyright; Dedication; Foreword; Preface; Acknowledgments; Author's Note; Introduction: Investigative Computer Forensics; Changes in Technology; Changes in the Role of the Investigator; What Is Computer Forensics?; Chapter 1: The Glue; The Relevancy of Truth; Foundations of Digital Evidence; Investigative Objectives; The Investigative Process; Trust; Privacy; Chapter 2: A Primer on Computers and Networks; The Mechanics of Electronically Stored Information; Optical Drives; The Server; The Router; Application Data; Metadata; Databases; Internet Data; E-mail Mechanics. 
505 8 |a The IP AddressComputer Time Artifacts; Social Media; Tablets; Cellular Telephones and Smartphones; Audio and Video; The Global Nervous System: Worldwide Data; Fundamentals of Network Traffic; The Firewall; Data- and Traffic-Gathering Applications; Dynamic Data Capture; The Cloud; International Data Security and Privacy Issues; Chapter 3: Computer Forensic Fundamentals; The Establishment of the Computer Forensic Laboratory; Evidence and Access Controls; The Forensic Workstation; Current Tools and Services; Building a Team and a Process; Computer Forensic Certifications; The Human Quotient. 
505 8 |a The Devil Is in the DetailsChapter 4: Investigative Fundamentals; The Investigative Mind-Set; Case Management; Fraud and Investigative Analysis; Information Sources and Records; Investigative Techniques; Surveillance and Interviewing; Trade Secret Theft and IP Investigations; Human Resources and Interpersonal Investigations; Reporting and Testifying; Chapter 5: The Underpinnings of Investigative Computer Forensics; Seizure and Examination of Digital Evidence; Data Classification and Records Management; Deleted Data; Backups and Systems Preservation; Computer Crime Analysis and Reconstruction. 
505 8 |a The Who, What, Where, How of DataContracts Agreements, Third Parties, and Other Headaches; Ethics and Management; Chapter 6: Tactical Objectives and Challenges in Investigative Computer Forensics; Preparing for the Attack; Early Case Assessment; Investigative Pacing, Timing, and Setting Expectations; Working with Multinational Teams; Collections of Electronic Data in the Cloud and in Social Media; Investigating Internet Service Provider Records; Bridging the Actual World with the Cyberworld; Packaging the Findings; Chapter 7: The Cyber-Firefighters; Incident Response Fundamentals. 
505 8 |a Data BreachesTheft and Fraud; Systems Failures; Internal Investigations; The Real-Time Predicament; Building a Global Resource Network; Honeypots and Other Attractive Intel-Gathering Targets; Databases and Structured Data; Organized Crime in the Cyber-Underworld; The Cyber-Underworld in Various Regions; State-Sponsored Cybercrime; Identity Theft; Intellectual Property and Trade Secret Theft; Botnets, Malware, Trojans, and Phishing; Data Breach Vulnerabilities; Hackers and Their Environment; Chapter 8: E-Discovery Responsibilities; Data Identification; Electronic Discovery Reference Model. 
520 |a Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both dome. 
546 |a English. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central College Complete 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer security. 
650 0 |a Fraud investigation. 
650 0 |a Corporations  |x Corrupt practices. 
650 2 |a Computer Security 
758 |i has work:  |a Investigative computer forensics (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGKcbPC6qPcwggYmbPXpxC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9780470932407 
852 |b E-Collections  |h ProQuest 
856 4 0 |u https://ebookcentral.proquest.com/lib/mcphs/detail.action?docID=817953  |z Full text (MCPHS users only)  |t 0 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21629669 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis25297432 
938 |a YBP Library Services  |b YANK  |n 9984872 
938 |a YBP Library Services  |b YANK  |n 12671325 
947 |a FLO  |x pq-ebc-base 
999 f f |s a7e05a85-6bc3-4cb2-a624-f15ea2c02ec0  |i 7a8acceb-b585-4a3c-86c7-c66d53a8339d  |t 0 
952 f f |a Massachusetts College of Pharmacy and Health Sciences  |b Online  |c Online  |d E-Collections  |t 0  |e ProQuest  |h Other scheme 
856 4 0 |t 0  |u https://ebookcentral.proquest.com/lib/mcphs/detail.action?docID=817953  |y Full text (MCPHS users only)