×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Computer Forensics: Computer Science Investigation / Edition 2
     

Computer Forensics: Computer Science Investigation / Edition 2

1.0 1
by John R Vacca
 

See All Formats & Editions

ISBN-10: 1584503890

ISBN-13: 9781584503897

Pub. Date: 01/02/2005

Publisher: Cengage Learning


Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to

Overview


Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.

Product Details

ISBN-13:
9781584503897
Publisher:
Cengage Learning
Publication date:
01/02/2005
Series:
Charles River Media Networking & Security Series
Edition description:
New Edition
Pages:
832
Product dimensions:
7.42(w) x 9.10(h) x 1.79(d)

Table of Contents


Introduction Part I Overview of Computer Forensics Technology Chapter 1 Computer Forensics Fundamentals Chapter 2 Types of Computer Forensics Technology Chapter 3 Types of Computer Forensics Systems Chapter 4 Vendor and Computer Forensics Services Part II Computer Forensics Evidence and Capture Chapter 5 Data Recovery Chapter 6 Evidence Collection and Data Seizure Chapter 7 Duplication and Preservation of Digital Evidence Chapter 8 Computer Image Verification and Authentication Part III Computer Forensics Analysis Chapter 9 Discovery of Electronic Evidence Chapter 10 Identification of Data Chapter 11 Reconstructing Past Events Chapter 12 Networks Part IV Countermeasures: Information Warfare Chapter 13 Fighting Against Macro Threats: Defensive Strategies Chapter 14 The Information Warfare Arsenal and Tactics of the Military Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies Chapter 17 The Information Warfare Arsenal of the Future Chapter 18 Surveillance Tools for Information Warfare of the Future Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare Part V Advanced Computer Forensics Systems and Future Directions Chapter 20 Advanced Computer Forensics Chapter 21 Summary, Conclusions, and Recommendations Appendix A Frequently Asked Questions Appendix B Computer Forensics Resources Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages Appendix D More Computer Forensics Cases Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter Appendix F Checklists by Chapter Appendix G About the CD-ROM Appendix H Glossary of Terms and Acronyms Index

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Computer Forensics: Computer Science Investigation 1 out of 5 based on 0 ratings. 1 reviews.
Anonymous More than 1 year ago