Computer Forensics: Computer Crime Scene Investigation

Overview

Terrorist attacks are no longer relegated to airports and federal buildings. Using personalcomputers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book/CD package provides a complete overview of computer forensics from its definition to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the ...
See more details below
Available through our Marketplace sellers.
Other sellers (Multimedia Set)
  • All (24) from $1.99   
  • New (3) from $29.92   
  • Used (21) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$29.92
Seller since 2008

Feedback rating:

(174)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
1584500182 BRAND NEW NEVER USED IN STOCK 125,000+ HAPPY CUSTOMERS SHIP EVERY DAY WITH FREE TRACKING NUMBER

Ships from: fallbrook, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$70.00
Seller since 2015

Feedback rating:

(215)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$70.00
Seller since 2015

Feedback rating:

(215)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Terrorist attacks are no longer relegated to airports and federal buildings. Using personalcomputers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book/CD package provides a complete overview of computer forensics from its definition to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminal. The book focuses on "solving the crime" rather than information security.

KEY FEATURES
- Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods and services
- Discusses data seizure and analysis, preservation of computer evidence, reconstruction of events and information warfare
- Case studies and vignettes of actual computer crimes are used
- CD includes demos of the latest computer forensics and auditing software

Author Biography: John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.

Read More Show Less

Editorial Reviews

From The Critics
Describes techniques for analyzing risks to a computer system, extracting and documenting computer evidence stored as data or magnetically encoded information, and implementing a security policy that protects information assets from potential intrusion. The guide is intended for law enforcement personnel and computer professionals involved in security. The CD-ROM contains demonstration software tools. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9781584500186
  • Publisher: Cengage Delmar Learning
  • Publication date: 5/1/2002
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 731
  • Product dimensions: 7.42 (w) x 9.24 (h) x 1.38 (d)

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted January 3, 2004

    Avoid reading this book ! Save your time & money

    The author may or may not have a working knowledge of computer forensics. One will never know from reading this useless book. The author spends the vast majority of the book, completly off topic. The title should have been 'Random ramblings of a political nature and general conspiracy theory' The tools on the CD are useless demo versions and at best would likely lead to confusion and lost of time. It took 3 hours to read this random wondering political nonsense. There needs to be a billing address where I can send a bill for my loss of time & a refund !

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted October 28, 2002

    Dissapointing but still Worth the price.

    This book is both a disappointment and a surprise. If you are a real techie, not much technical stuff in here. It gives a good high-level view of the topic and I stress high level. He seems to avoid being technical at all costs. The author wanders many times from the subject at hand into areas he must find personally interesting that have nothing to do with Computer Forensics. One irritant is the author¿s tendency to repeat himself chapter after chapter ad nauseam. The author seems fascinated with the concept of slack on the file system, but at the same time has difficulty explaining what this simple topic is. I question the author¿s technical depth, but I think he is fairly good at assimilating information from diverse topics. The book could have used much more and better editing. On the positive side, I learned a lot that I had not expected and the book is full of excellent URLs. The CD is worthless.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)