Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 33.
... backup and data storage; databases; project management; scheduling; word processing, etc. 6. How do your employees ... backup tapes reused? What is the backup-lifecycle for a tape? Who conducts the backup of each computer, network, or ...
... backup tapes from being reused in the normal course of business may constitute spoliation, if the tapes contain information responsive to discovery.22 Accordingly, as soon as litigation starts, or is reasonably certain, parties must ...
... backup tapes and particular computers for review or immediately bring in an electronic evidence expert to prepare evidentiary copies of every hard drive in the office. Whatever the producing party does, however, it should keep the ...
... backup tapes containing pertinent data rather than just the data itself, whenever possible. Preserving the media, as opposed to preserving only the files that appear to be interesting at the time of the initial review, allows the ...
... backup media, especially backup tapes that are part of a media rotation pool. The producing party should also consider taking possession of all hard drives and other media containing data responsive to initial disclosure or discovery ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |