feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
  • 1
    Book
    Book
    Rockland, Mass. : Syngress | Oxford : Elsevier Science [distributor]
    UID:
    b3kat_BV036754454
    Format: XXXV, 699 S. , Ill. , 24 cm
    ISBN: 9781597492287 , 1597492280
    Note: Includes index.
    Language: English
    Keywords: Computerkriminalität ; Ermittlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Rockland, Mass. :Syngress ;
    UID:
    almahu_9948026217702882
    Format: 1 online resource (734 p.)
    Edition: 1st edition
    ISBN: 1-281-09638-5 , 9786611096380 , 0-08-055608-6
    Content: Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion doll
    Note: Includes index. , Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody , Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?" , SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience , Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers! , Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works? , Conduct Objective Analysis and Reporting , English
    Additional Edition: ISBN 1-59749-228-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages