Amazon cover image
Image from Amazon.com

Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler.

By: Contributor(s): Material type: TextTextSeries: Security series (Upper Saddle River, N.J.)Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007.Edition: 1st edDescription: xviii, 534 p. : ill. ; 24 cmISBN:
  • 9780131547278 (alk. paper)
  • 0131547275 (alk. paper)
Subject(s): DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 V59145 2007
Online resources:
Contents:
Admissibility of electronic evidence. Forensic evidence and crime investigation ; Computer forensics and digital detective work -- Preparing for E-evidence collection and preservation. Tools, environents, equipment, and certifications ; Policies and procedures ; Data, PDA, and cell phone forensics -- Forensic examination of computers and digital and electronic media. Operating systems and data transmission basics for digital investigations ; Investigating Windows, Linux, and graphics files ; E-mail and Webmail forensics -- Detecting intrusions, malware, and fraud. Internet and network forensics and intrusion detection ; Tracking down those who intend to do harm on a large scale ; Fraud and forensic accounting investigations -- Legal, ethical, and testimony topics. Federal rules and criminal codes ; Ethical and professional responsibility in testimony -- Appendix a: online resources -- Appendix b: government and legal references -- Appendix c: sample legal forms, letters, and motions -- Appendix d: summaries of court cases -- Glossary.
Item type: Books
Holdings
Current library Collection Call number Vol info Status Date due Barcode
Judith Thomas Library General Stacks BKS QA 76.9 .A25 V59145 2007 (Browse shelf(Opens below)) AUA014523 Available AUA014523
Browsing Judith Thomas Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
QA 76.9 .A25 S3523 2007 Information assurance for the enterprise : QA 76.9 .A25 S562 2014 Cybersecurity and cyberwar : QA 76.9 .A25 S562 2014 Cybersecurity and cyberwar : QA 76.9 .A25 V59145 2007 Computer forensics : QA 76.9 .A73 D63 2003 Documenting software architectures : QA 76.9 .A73 M38 2008 Professional Linux kernel architecture / QA 76.9 .A73 P377 2012 Computer architecture :

Includes bibliographical references (p. 516-522) and index.

Admissibility of electronic evidence. Forensic evidence and crime investigation ; Computer forensics and digital detective work -- Preparing for E-evidence collection and preservation. Tools, environents, equipment, and certifications ; Policies and procedures ; Data, PDA, and cell phone forensics -- Forensic examination of computers and digital and electronic media. Operating systems and data transmission basics for digital investigations ; Investigating Windows, Linux, and graphics files ; E-mail and Webmail forensics -- Detecting intrusions, malware, and fraud. Internet and network forensics and intrusion detection ; Tracking down those who intend to do harm on a large scale ; Fraud and forensic accounting investigations -- Legal, ethical, and testimony topics. Federal rules and criminal codes ; Ethical and professional responsibility in testimony -- Appendix a: online resources -- Appendix b: government and legal references -- Appendix c: sample legal forms, letters, and motions -- Appendix d: summaries of court cases -- Glossary.