Sheetz Computer Forensics
1. Auflage 2013
ISBN: 978-0-470-12402-4
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
An Essential Guide for Accountants, Lawyers, and Managers
E-Book, Englisch, 352 Seiten, E-Book
ISBN: 978-0-470-12402-4
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Would your company be prepared in the event of:
* Computer-driven espionage
* A devastating virus attack
* A hacker's unauthorized access
* A breach of data security?
As the sophistication of computer technology has grown, so has therate of computer-related criminal activity. Subsequently, Americancorporations now lose billions of dollars a year to hacking,identity theft, and other computer attacks. More than ever,businesses and professionals responsible for the critical data ofcountless customers and employees need to anticipate and safeguardagainst computer intruders and attacks.
The first book to successfully speak to the nontechnicalprofessional in the fields of business and law on the topic ofcomputer crime, Computer Forensics: An Essential Guide forAccountants, Lawyers, and Managers provides valuable advice on thehidden difficulties that can blindside companies and result indamaging costs.
Written by industry expert Michael Sheetz, this important bookprovides readers with an honest look at the computer crimes thatcan annoy, interrupt--and devastate--a business. Readers areequipped not only with a solid understanding of how computersfacilitate fraud and financial crime, but also how computers can beused to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computercrimes but have a limited technical background, this book is foryou. Get Computer Forensics: An Essential Guide for Accountants,Lawyers, and Managers and get prepared.
Autoren/Hrsg.
Weitere Infos & Material
Introduction.
Acknowledgments.
1 A Definition of Computer Forensics.
Introduction.
Forensic Science.
History of Computer Forensics.
World Wide Web.
Hacker Community.
Conclusion.
Notes.
Suggested Reading.
2 Basics of Computer Forensic Concepts.
Introduction.
Understanding Digital Evidence.
Input.
Storage.
Processing.
What Computer Data Is.
Output.
Conclusion.
Notes.
Suggested Reading.
3 Preservation and Collection of Digital Evidence.
Introduction.
Rules of Evidence.
Preservation.
Collection.
Conclusion.
Note.
Suggested Reading.
4 Analysis of Digital Evidence.
Introduction.
Forensic Analysis.
Conclusion.
Notes.
Suggested Reading.
5 Reporting and Rendering the Opinion.
Introduction.
Preparing the Report.
Presentation.
Trial Process.
Conclusion.
Suggested Reading.
6 Computer Attacks.
Hackers and Phreakz Oh My.
Hackers: Unauthorized Use and Trespassing.
Wireless Hacking.
Malware.
Attacks from the Inside.
Conclusion.
Notes.
Suggested Reading.
7 Computers as Tools for Evil.
Introduction.
Computers and Crime.
Identity Theft.
Concealment.
Auction Fraud and Retail Cons.
Counterfeiting and Forgery.
Prostitution.
Securities Fraud.
Conclusion.
Notes.
8 Computer Tools and the Forensic Examination.
Introduction.
Assuming Control of the Case.
Understanding the Case.
Evaluating the Evidence.
Examining the "Live" System.
Collecting Data from a Dead System.
Imaging the Drive.
Data Extraction.
Data Analysis.
Conclusion.
Notes.
9 Presenting Digital Evidence in Court.
Introduction.
Evidence.
Types of Evidence.
Expert Witnesses.
Legal Requirements of Evidence.
Search and Seizure.
Conclusion.
Notes.
Index.