Description |
1 online resource |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Physical Medium |
polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 |
Description |
data file |
Contents |
Ch. 1. Computer forensics in today's world -- Ch. 2. Digital forensics: an overview -- Ch. 3. Developing an enterprise digital investigative/electronic discovery capability -- Ch. 4. Integrating a quality assurance program in a digital forensic laboratory -- Ch. 5. Balancing e-discovery challenges with legal and IT requirements -- Ch. 6. Forensic software and hardware -- Ch. 7. Incident response: live forensics and investigations -- Ch. 8. Seizure of digital information -- Ch. 9. Conducting cyber investigations -- Ch. 10. Acquiring data, duplicating data, and recovering deleted files -- Ch. 11. Forensic disovery and analysis using BackTrack -- Ch. 12. Windows, Linux, and Macintosh boot processes -- Ch. 13. Windows and Linux forensics -- Ch. 14. Investigating network traffic and investigating logs -- Ch. 15. Router forensics and network forensics -- Ch. 16. Investigating wireless attacks -- Ch. 17. E-mail forensics -- Ch. 18. Steganography and application password crackers -- Ch. 19. PDA and Blackberry -- Ch. 20. MP3 forensics. |
Summary |
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab. * Digital investigation and forensics is a growing industry * Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery * Appeals to law enforcement agencies with limited budgets. |
Language |
English. |
Subject |
Computer crimes -- Investigation.
|
|
Electronic discovery (Law)
|
|
Criminalité informatique -- Enquêtes.
|
|
Communication électronique des pièces.
|
|
Computer crimes -- Investigation.
|
|
Electronic discovery (Law)
|
|
Computer crimes -- Investigation
|
|
Electronic discovery (Law)
|
Genre/Form |
dissertations.
|
|
Academic theses
|
|
Academic theses.
|
|
Thèses et écrits académiques.
|
Added Author |
Cardwell, Kevin. Author.
|
Other Form: |
Print version: Cardwell, Kevin. Best damn cybercrime and digital forensics book period. Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2007 (DLC) 2008295064 |
ISBN |
1597492280 |
|
9781597492287 |
|
9781597492287 |
|
1281096385 |
|
9781281096388 |
|
9786611096380 |
|
6611096388 |
|
0080556086 |
|
9780080556086 |
Standard No. |
AU@ 000043178423 |
|
CHBIS 006041570 |
|
CHBIS 009872107 |
|
CHNEW 001007843 |
|
CHVBK 17040563X |
|
CHVBK 19961685X |
|
DEBBG BV042305728 |
|
DEBSZ 355443686 |
|
DEBSZ 405318324 |
|
NZ1 12541580 |
|
NZ1 14540489 |
|
AU@ 000057121959 |
|