Handbook of Computer Crime Investigation: Forensic Tools and TechnologyEoghan Casey Elsevier, 2001. gada 22. okt. - 448 lappuses Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
|
No grāmatas satura
1.–5. rezultāts no 87.
... identify patterns and gaps, shed light on a crime, and lead to other sources of evidence. Before an accurate timeline can be constructed, discrepancies such as system clock inaccuracies and different time zones must be taken into ...
... identification in Modern Scientific Evidence: The Law And Science Of Expert Testimony, Volume 2 by David L. Faigman, David H. Kaye, Michael J. Saks, and Joseph Sanders, editors, St Paul: West Publishing Co. US DOJ (2001) Searching and ...
... identify and make all pertinent material available to the other parties. This chapter addresses what a responding party or a litigant complying with initial disclosure (collectively, 'producing party') should consider or do to ...
... identify anything problematic, such as records that they must withhold from production on the basis of privilege or other grounds, and records that they will produce only under a protective order, such as records involving trade secrets ...
... identify all pertinent records. With electronic as well as paper records, this usually requires attention to ... identified or produced. Typically, the producing party's attorneys will conduct this review, especially with regard to ...
Saturs
1 | |
17 | |
53 | |
TECHNOLOGY | 133 |
CASE EXAMPLES | 361 |
APPENDIX 1 | 415 |
APPENDIX 2 | 419 |
APPENDIX 3 | 425 |
APPENDIX 4 | 433 |
APPENDIX 5 | 435 |
AUTHOR INDEX | 437 |
SUBJECT INDEX | 439 |
Citi izdevumi - Skatīt visu
Handbook of Computer Crime Investigation: Forensic Tools and Technology Eoghan Casey Priekšskatījums nav pieejams - 2002 |
Bieži izmantoti vārdi un frāzes
Populāri fragmenti
Atsauces uz šo grāmatu
Criminal Profiling: An Introduction to Behavioral Evidence Analysis Brent E. Turvey Ierobežota priekšskatīšana - 2002 |