Listing 1 - 10 of 17 | << page >> |
Sort by
|
Choose an application
Evidence, Criminal --- Criminal evidence --- Criminal investigation --- Evidence (Law) --- Reasonable doubt --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Computer crimes. --- Electronic evidence. --- Evidence, Criminal. --- Computer. Automation --- Criminology. Victimology --- Computer crimes --- Electronic evidence --- Criminal procedure --- Crime --- Privacy, Right of --- Digital evidence --- Evidence, Documentary --- Criminalité informatique --- Criminalistique --- Internet --- Cybercriminalité. --- Preuve
Choose an application
Computer crimes. --- Evidence, Criminal. --- 681.3*K5 --- 681.3*K5 Legal aspects of computing --- Legal aspects of computing --- Criminal evidence --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Computer crimes --- Electronic evidence --- Evidence, Criminal --- Digital evidence --- Evidence, Documentary
Choose an application
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective compariso
Computer crimes --- Evidence, Criminal --- Forensic sciences --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Investigation --- 6813*C20 --- Computer-communication networks: general: data communications, opensystems interconnection reference model (OSI), security and protection (e.g., firewalls)
Choose an application
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds *Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms *Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations.
Choose an application
Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and an
Choose an application
This completely revised reference work will concentrate on providing specific practical information in a well organized format. Each chapter will have a consistent structure, covering similar aspects of different systems when appropriate. In order to provide readers with the knowledge they will need, and to create a thorough understanding of how to utilize the widest range of digital evidence in vastly varying situations, this work is divided into two parts: Investigative Methodology and Forensic Analysis. The Investigative Methodology section will provide guidance in how to conduct
Computer crimes --- Evidence, Criminal. --- Investigation. --- Criminal evidence --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Information Technology --- General and Others
Choose an application
Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this pro
Child sexual abuse --- Child pornography. --- Internet pornography. --- Internet and children. --- Children and the Internet --- Internet (Computer network) and children --- Children --- Cyberporn --- Online pornography --- Pornography --- Image-based sexual abuse --- Chicken porn --- Children in pornography --- Kiddie porn --- Child abuse --- Prevention. --- Child pornography --- Internet --- Obscenity (Law) --- Law and legislation
Choose an application
Computer crimes --- Digital forensic science. --- Electronic evidence. --- Evidence, Criminal. --- Preuve (droit pénal) --- Preuve électronique. --- Informatique légale --- Investigation. --- Enquêtes.
Choose an application
Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme
Computer networks -- Examinations -- Study guides. --- Linux -- Examinations -- Study guides. --- Operating systems (Computers) -- Examinations -- Study guides. --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Computer networks --- Examinations --- Linux --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Slackware Linux --- SUSE Linux
Choose an application
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised
Computer security. --- Computer viruses --- Computer crimes --- Investigation. --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Software viruses --- Viruses, Computer --- Malware (Computer software) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information Technology --- General and Others
Listing 1 - 10 of 17 | << page >> |
Sort by
|