Computer Forensics: Computer Science Investigation / Edition 2

Paperback (Print)
Buy Used
Buy Used from BN.com
$37.46
(Save 25%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (13) from $1.99   
  • Used (13) from $1.99   
Close
Sort by
Page 1 of 2
Showing 1 – 10 of 13 (2 pages)
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$1.99
Seller since 2010

Feedback rating:

(5751)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Good
This book has a light amount of wear to the pages, cover and binding. Blue Cloud Books ??? Hot deals from the land of the sun.

Ships from: Phoenix, AZ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$2.49
Seller since 2009

Feedback rating:

(3473)

Condition: Good
Ships same day or next business day! UPS expedited shipping available (Priority Mail for AK/HI/APO/PO Boxes). Used sticker & some writing and/or highlighting. Used books may not ... include working access code or dust jacket Read more Show Less

Ships from: Columbia, MO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$2.75
Seller since 2009

Feedback rating:

(3725)

Condition: Good
27/05/2005 Paperback Used-Good Book in good or better condition. Dispatched same day from US or UK warehouse.

Ships from: Valley Cottage, NY

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$4.00
Seller since 2014

Feedback rating:

(7)

Condition: Good
2005 Paperback Good Connecting readers with great books since 1972. Used books may not include companion materials, some shelf wear, may contain highlighting/notes, and may not ... include cd-rom or access codes. Customer service is our top priority! Read more Show Less

Ships from: McKinney, TX

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$5.00
Seller since 2005

Feedback rating:

(49525)

Condition: Very Good
SHIPS FAST! via UPS(AK/HI Priority Mail) within 24 hrs/ used sticker/some hilite

Ships from: Columbia, MO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$5.00
Seller since 2014

Feedback rating:

(2)

Condition: Good
2005 Paperback Good Connecting readers with great books since 1972. Used books may not include companion materials, some shelf wear, may contain highlighting/notes, and may not ... include cd-rom or access codes. Customer service is our top priority! Read more Show Less

Ships from: North Olmsted, OH

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$7.50
Seller since 2014

Feedback rating:

(8)

Condition: Good
2005 Paperback Good Connecting readers with great books since 1972. Used books may not include companion materials, some shelf wear, may contain highlighting/notes, and may not ... include cd-rom or access codes. Customer service is our top priority! Read more Show Less

Ships from: Cedar Park, TX

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$17.95
Seller since 2014

Feedback rating:

(22)

Condition: Good
2005 Trade paperback 2nd ed. Good. Trade paperback (US). Glued binding. 750 p. Charles River Media Networking/Security.

Ships from: Pueblo West, CO

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$17.96
Seller since 2014

Feedback rating:

(4)

Condition: Good
2005-05-27 Paperback Good Expedited shipping is available for this item!

Ships from: Burbank, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$20.63
Seller since 2010

Feedback rating:

(14)

Condition: Good
02/01/2005 Paperback 2nd Revised edition ***SIMPLY BRIT*** We have dispatched from our UK warehouse books of good condition to over 1 million satisfied customers worldwide. We ... are committed to providing you with a reliable and efficient service at all times. *****PLEASE NOTE: This item is shipping from an authorized seller in Europe. In the event that a return is necessary, you will be able to return your item within the US. To learn more about our European sellers and policies see the BookQuest FAQ section***** Read more Show Less

Ships from: Buckingham, United Kingdom

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 2
Showing 1 – 10 of 13 (2 pages)
Close
Sort by

Overview

Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.

Read More Show Less

Product Details

  • ISBN-13: 9781584503897
  • Publisher: Cengage Learning
  • Publication date: 1/2/2005
  • Series: Charles River Media Networking & Security Series
  • Edition description: New Edition
  • Edition number: 2
  • Pages: 832
  • Product dimensions: 7.42 (w) x 9.10 (h) x 1.79 (d)

Meet the Author

John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.

Read More Show Less

Table of Contents

Introduction Part I Overview of Computer Forensics Technology Chapter 1 Computer Forensics Fundamentals Chapter 2 Types of Computer Forensics Technology Chapter 3 Types of Computer Forensics Systems Chapter 4 Vendor and Computer Forensics Services Part II Computer Forensics Evidence and Capture Chapter 5 Data Recovery Chapter 6 Evidence Collection and Data Seizure Chapter 7 Duplication and Preservation of Digital Evidence Chapter 8 Computer Image Verification and Authentication Part III Computer Forensics Analysis Chapter 9 Discovery of Electronic Evidence Chapter 10 Identification of Data Chapter 11 Reconstructing Past Events Chapter 12 Networks Part IV Countermeasures: Information Warfare Chapter 13 Fighting Against Macro Threats: Defensive Strategies Chapter 14 The Information Warfare Arsenal and Tactics of the Military Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies Chapter 17 The Information Warfare Arsenal of the Future Chapter 18 Surveillance Tools for Information Warfare of the Future Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare Part V Advanced Computer Forensics Systems and Future Directions Chapter 20 Advanced Computer Forensics Chapter 21 Summary, Conclusions, and Recommendations Appendix A Frequently Asked Questions Appendix B Computer Forensics Resources Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages Appendix D More Computer Forensics Cases Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter Appendix F Checklists by Chapter Appendix G About the CD-ROM Appendix H Glossary of Terms and Acronyms Index

Read More Show Less

Customer Reviews

Average Rating 1
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted April 11, 2012

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)