opac banner
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Computer forensics :

By: Material type: TextTextEdition: Second editionDescription: xv, 408 pages : illustrations, formsISBN:
  • 9781449692223 (pbk.)
  • 1449692222 (pbk.)
Subject(s): DDC classification:
  • 363.25/9680973
Contents:
Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile devices in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Books Books ASCOT Library - Zabali Campus Reference Reference 363.25 (Browse shelf(Opens below)) Available 3470

Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile devices in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator.

There are no comments on this title.

to post a comment.