Computer Forensics : an Essential Guide for Accountants, Lawyers, and Managers.
Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, Ame...
Saved in:
Online Access: |
Full text (MCPHS users only) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Somerset :
Wiley,
2013
|
Subjects: | |
Local Note: | ProQuest Ebook Central |
Table of Contents:
- ""Cover ""; ""Title Page ""; ""Copyright ""; ""Contents ""; ""Introduction ""; ""Acknowledgments ""; ""Chapter 1 A Definition of Computer Forensics ""; ""Introduction ""; ""Forensic Science ""; ""History of Computer Forensics ""; ""World Wide Web ""; ""Hacker Community ""; ""Conclusion ""; ""Notes ""
- ""Suggested Reading """"Chapter 2 Basics of Computer Forensic Concepts ""; ""Introduction ""; ""Understanding Digital Evidence ""; ""Input ""; ""Storage ""; ""Processing ""; ""What Computer Data Is ""; ""Output ""; ""Conclusion ""; ""Notes ""; ""Suggested Reading ""
- ""Chapter 3 Preservation and Collection of Digital Evidence """"Introduction ""; ""Rules of Evidence ""; ""Preservation ""; ""Collection ""; ""Conclusion ""; ""Note ""; ""Suggested Reading ""; ""Chapter 4 Analysis of Digital Evidence ""; ""Introduction ""; ""Forensic Analysis ""; ""Conclusion ""
- ""Notes """"Suggested Reading ""; ""Chapter 5 Reporting and Rendering the Opinion ""; ""Introduction ""; ""Preparing the Report ""; ""Photographic Documentation ""; ""Reporting ""; ""Executive Summary or Abstract ""; ""Table of Contents ""; ""Body or Findings ""; ""Conclusion ""
- ""Supporting Documents """"Appendixes ""; ""Presentation ""; ""Trial Process ""; ""Dispute ""; ""Complaint ""; ""Service of Process ""; ""Pretrial ""; ""Trial ""; ""Conclusion ""; ""Suggested Reading ""; ""Chapter 6 Computer Attacks ""; ""Hackers and Phreakz Oh My ""