The Resource Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource)
Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource)
Resource Information
The item Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.
This item is available to borrow from 1 library branch.
- Extent
- xvii, 152 p
- Contents
-
- A definition of computer forensics
- Introduction
- Forensic science
- The history of computer forensics
- The world wide web
- The hacker community
- Conclusion
- Basic of computer forensic concepts
- Introduction
- Understanding digital evidence
- Storage
- Processing
- What is computer data?
- Output
- Conclusion
- Preservation and collection of digital evidence
- Introduction
- Rules of evidence
- Preservation
- Collection
- Conclusion
- Analysis of digital evidence
- Introduction
- Forensic analysis
- Conclusion
- Reporting and rendering the opinion
- Introduction
- Preparing the report
- Presentation
- The trial process
- Conclusion
- Computer attacks
- Hackers and phreakz oh my
- The hacker: unauthorized use and trespassing
- Wireless hacking
- Malware
- Attacks from the inside
- Conclusion
- Computers as tools for evil
- Introduction
- Computers and crime
- Identity theft
- Concealment
- Auction fraud and retail cons
- Counterfeiting and forgery
- Prostitution
- Securities fraud
- Conclusion
- Computer tools and the forensic examination
- Introduction
- Assuming control of the case
- Understand the case
- Evaluate the evidence
- Examining the ?live? system
- Collecting data from a dead system
- Imaging the drive
- Data extraction
- Data analysis
- Conclusion
- Presenting digital evidence in court
- Introduction
- Evidence
- Types of evidence
- Expert witnesses
- Legal requirements of evidence
- Search and seizure
- Conclusion
- Index
- Label
- Computer forensics : an essential guide for accountants, lawyers, and managers
- Title
- Computer forensics
- Title remainder
- an essential guide for accountants, lawyers, and managers
- Statement of responsibility
- Michael Sheetz
- Language
- eng
- Cataloging source
- CaPaEBR
- http://library.link/vocab/creatorName
- Sheetz, Michael
- Index
- index present
- Literary form
- non fiction
- Nature of contents
-
- standards specifications
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- ebrary, Inc
- http://library.link/vocab/subjectName
- Computer crimes
- Label
- Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource)
- Bibliography note
- Includes bibliographical references and index
- Color
- multicolored
- Contents
- A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index
- Control code
- ebr10713577
- Dimensions
- unknown
- Extent
- xvii, 152 p
- Form of item
-
- online
- electronic
- Reproduction note
- Electronic reproduction.
- Specific material designation
- remote
- System control number
- (OCoLC)183266597
- Label
- Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource)
- Bibliography note
- Includes bibliographical references and index
- Color
- multicolored
- Contents
- A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index
- Control code
- ebr10713577
- Dimensions
- unknown
- Extent
- xvii, 152 p
- Form of item
-
- online
- electronic
- Reproduction note
- Electronic reproduction.
- Specific material designation
- remote
- System control number
- (OCoLC)183266597
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/portal/Computer-forensics--an-essential-guide-for/NcK_iwOSwuc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Computer-forensics--an-essential-guide-for/NcK_iwOSwuc/">Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/portal/Computer-forensics--an-essential-guide-for/NcK_iwOSwuc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Computer-forensics--an-essential-guide-for/NcK_iwOSwuc/">Computer forensics : an essential guide for accountants, lawyers, and managers, Michael Sheetz, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>