Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer CrimesJr., Albert Marcella, Robert S. Greenfield CRC Press, 2002. jan. 23. - 464 oldal Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence o |
Tartalomjegyzék
Chapter 1 The Goal of the Forensic Investigation | 3 |
Chapter 2 How to Begin a NonLiturgical Forensic Examination | 19 |
Tracing Activity on a WindowsBased Desktop | 47 |
What is Possible and Where to Look Under the Hood | 79 |
Automated Tools Used to Secure a System Throughout the Stages of a Forensic Investigation | 97 |
Chapter 6 Network Intrusion Management and Profiling | 117 |
Chapter 7 Cyber Forensics and the Legal System | 133 |
FEDERAL AND INTERNATIONAL GUIDELINES | 147 |
A Guide for Federal Agencies | 287 |
Chapter 15 Encryption | 335 |
Chapter 16 Intellectual Property | 361 |
FORENSICS TOOLS | 373 |
Chapter 17 Forensic and Security Assessment Tools | 375 |
Chapter 18 How to Report InternetRelated Crime | 389 |
An Auditors Basic Checklist | 391 |
IV | 397 |
Chapter 8 Searching and Seizing Computers and Obtaining Electronic Evidence | 149 |
Chapter 9 Computer Crime Policy and Programs | 179 |
Chapter 10 International Aspects of Computer Crime | 205 |
Chapter 11 Privacy Issues in the HighTech Context | 221 |
Chapter 12 Critical Infrstructure Protection | 227 |
Legal Issues | 249 |
Más kiadások - Összes megtekintése
Gyakori szavak és kifejezések
activity addition Administration agency allow Amendment analysis application appropriate attacks Attorney authority changes communications computer crime concerns conduct consider contain contract Convention court created crime criminal critical defendant Department designed determine develop discussed disk document drive e-mail E-SIGN effective electronic processes encryption ensure establish evidence examination example Exhibit existing federal files forensic fraud Group identify important individual infrastructure Internet intrusion investigation involved issues Justice law enforcement logs means methods monitoring obtain operating particular parties person possible procedures protect questions reason records regulations requirements responsible result risk rules sector signature specific standards statute stored technical transactions United Windows
Hivatkozások erre a könyvre
Internet Child Pornography and the Law: National and International Responses Dr Yaman Akdeniz Nincs elérhető előnézet - 2013 |
Computational Science and Its Applications -- ICCSA 2004: International ... Antonio Laganà Nincs elérhető előnézet - 2004 |