Murakami Sale
 
 

Recently Viewed clear list


Original Essays | August 18, 2014

Ian Leslie: IMG Empathic Curiosity



Today, we wonder anxiously if digital media is changing our brains. But if there's any time in history when our mental operations changed... Continue »
  1. $18.89 Sale Hardcover add to wish list

spacer
Qualifying orders ship free.
$32.00
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Burnside - Bldg. 2 Networking- Computer Forensics

More copies of this ISBN

Computer Forensics Computer Crime SC 2ND Edition

by

Computer Forensics Computer Crime SC 2ND Edition Cover

 

Synopses & Reviews

Publisher Comments:

Organizations today face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source and include fraud, copyright infringement, and stolen data. Computer Forensics: Computer Crime Scene Investigation, Third Edition provides a comprehensive introduction to computer forensics investigative techniques. The reader will gain the knowledge and skills required to conduct a computer forensics investigation from initial discovery to completion. The reader will also learn how to exploit their organization's Computer Incident Response Team (CIRT); collect, manage and record digital evidence; and leverage powerful software tools and techniques to uncover hidden or deleted information. Approximately 25% of the book is dedicated to hands-on exercises. Employing the latest software forensic tools contained in the CD in the back of the book, users will be able to capture disk images, undelete files, search memory in real-time for hidden data, and discover compromised machines. Much has changed in the realm of information security and computer forensics since the previous edition, so the book has been completely updated to cover advances in the field.

Synopsis:

Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.

About the Author

John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.

Table of Contents

Introduction Part I Overview of Computer Forensics Technology Chapter 1 Computer Forensics Fundamentals Chapter 2 Types of Computer Forensics Technology Chapter 3 Types of Computer Forensics Systems Chapter 4 Vendor and Computer Forensics Services Part II Computer Forensics Evidence and Capture Chapter 5 Data Recovery Chapter 6 Evidence Collection and Data Seizure Chapter 7 Duplication and Preservation of Digital Evidence Chapter 8 Computer Image Verification and Authentication Part III Computer Forensics Analysis Chapter 9 Discovery of Electronic Evidence Chapter 10 Identification of Data Chapter 11 Reconstructing Past Events Chapter 12 Networks Part IV Countermeasures: Information Warfare Chapter 13 Fighting Against Macro Threats: Defensive Strategies Chapter 14 The Information Warfare Arsenal and Tactics of the Military Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies Chapter 17 The Information Warfare Arsenal of the Future Chapter 18 Surveillance Tools for Information Warfare of the Future Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare Part V Advanced Computer Forensics Systems and Future Directions Chapter 20 Advanced Computer Forensics Chapter 21 Summary, Conclusions, and Recommendations Appendix A Frequently Asked Questions Appendix B Computer Forensics Resources Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages Appendix D More Computer Forensics Cases Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter Appendix F Checklists by Chapter Appendix G About the CD-ROM Appendix H Glossary of Terms and Acronyms Index

Product Details

ISBN:
9781584503897
Subtitle:
Computer Science Investigation
Author:
Vacca, John
Author:
Vacca, John R.
Author:
Vacca, John R(John R. Vacca)
Publisher:
Charles River Media
Subject:
Programming - General
Subject:
Computer networks
Subject:
Computer security
Subject:
Security
Subject:
Security - General
Subject:
Electronics - General
Subject:
Engineering / Electrical
Subject:
Computer Engineering
Subject:
Forensic sciences
Subject:
Networking-Computer Security
Subject:
General Technology
Copyright:
Edition Number:
2
Series:
Charles River Media Networking/Security
Publication Date:
January 2005
Binding:
Paperback
Grade Level:
Professional and scholarly
Language:
English
Pages:
864
Dimensions:
9.04x7.34x1.90 in. 3.16 lbs.

Other books you might like

  1. Computer Forensics: Principles and... Used Trade Paper $102.00
  2. Computer Forensics: Evidence... New Hardcover $114.95
  3. Body of Evidence Used Mass Market $4.50
  4. Handbook of Computer Crime... New Trade Paper $87.75

Related Subjects

Computers and Internet » Networking » Computer Forensics
Computers and Internet » Networking » Computer Security
History and Social Science » Crime » General

Computer Forensics Computer Crime SC 2ND Edition Used Trade Paper
0 stars - 0 reviews
$32.00 In Stock
Product details 864 pages Charles River Media - English 9781584503897 Reviews:
"Synopsis" by , Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.