Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 46.
... disk using a scalpel may inadvertently damage the media, causing data loss. □ Offender covering behavior: the perpetrator of a crime may delete evidence from a hard drive. □ Victim actions: the victim of a crime may delete e-mails in ...
... hard disk drive or a PC card, it is almost always recommended that once it is wet it remains continuously immersed until it can be properly treated and dried in a laboratory. 13 This discussion is limited to modern magnetic media or ...
... disk that contains incriminating e-mail, or chemical traces in computer equipment associated with drug manufacturing ... drive to read the data on the undamaged portions of the tape. 1 For example, courts must construe the Federal Rules ...
... hard drive in the office. Whatever the producing party does, however, it should keep the following in mind with ... hard drives immediately to preserve any evidence they contain. The owner's CIO cuts the consultant short, saying that ...
... disk-duplicating equipment or commercial drive duplication programs to clone hard drives quickly. The producing party can take similar steps to copy any other frequently used media. Regardless of how the producing party goes about ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |