Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 69.
... creating this book and their tolerance of the demands it placed on them. I would also like to thank Nick Fallon for making this book possible and Linda Beattie, Roopa Baliga, and the others at Academic Press for their efforts. Thanks to ...
... created and preserved. An independent third party should be able to examine those processes and achieve the same result. Principle 4: The officer in charge of the case is responsible for ensuring that the law and these principles are ...
... creating a detailed relational reconstruction – where each party was located and how they interacted – can reveal a crucial interaction. Sorting financial transactions by individuals or organizations involved can reveal a pattern ...
... created on a computer. For instance, e-mail headers are created as the message is passed through Message Transfer Agents. Comparing the header of one message with others that were sent through the same system(s) can reveal significant ...
... creating processing challenges, evidence dynamics creates investigative and legal challenges, making it more difficult to determine what occurred and to prove that the evidence is authentic and reliable. Additionally, any conclusions ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |