TheMico University College Library

“Do it with thy might”

Opening Hours

Mondays – Thursdays 8:00am – 10:00pm
Fridays 8:00am – 7:00pm
Saturdays 10:00am – 6:00pm
Sundays 10:00am – 5:00pm

Image from Google Jackets

Computer forensics : an essential guide for accountants, lawyers, and managers / Michael Sheetz.

Material type: TextTextPublication details: Hoboken, N.J. : John Wiley & Sons, Inc., c2007.Description: xvii, 152 p. ; 24 cmISBN:
  • 9780471789321 (cloth)
  • 0471789321 (cloth)
Subject(s): DDC classification:
  • 363.25 SHE 22
LOC classification:
  • HV8079.C65 S44 2007
Online resources:
Contents:
A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Status Date due Barcode
Book Book The Mico University College General Stacks Non-fiction 363.25 SHE (Browse shelf(Opens below)) Available 74450

Includes bibliographical references and index.

A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.

There are no comments on this title.

to post a comment.