Computer Forensics (eBook)
176 Seiten
John Wiley & Sons (Verlag)
978-1-119-12027-8 (ISBN)
* Computer-driven espionage
* A devastating virus attack
* A hacker's unauthorized access
* A breach of data security?
As the sophistication of computer technology has grown, so has the
rate of computer-related criminal activity. Subsequently, American
corporations now lose billions of dollars a year to hacking,
identity theft, and other computer attacks. More than ever,
businesses and professionals responsible for the critical data of
countless customers and employees need to anticipate and safeguard
against computer intruders and attacks.
The first book to successfully speak to the nontechnical
professional in the fields of business and law on the topic of
computer crime, Computer Forensics: An Essential Guide for
Accountants, Lawyers, and Managers provides valuable advice on the
hidden difficulties that can blindside companies and result in
damaging costs.
Written by industry expert Michael Sheetz, this important book
provides readers with an honest look at the computer crimes that
can annoy, interrupt--and devastate--a business. Readers are
equipped not only with a solid understanding of how computers
facilitate fraud and financial crime, but also how computers can be
used to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computer
crimes but have a limited technical background, this book is for
you. Get Computer Forensics: An Essential Guide for Accountants,
Lawyers, and Managers and get prepared.
MICHAEL SHEETZ, JD, is Assistant Professor of Criminal Justice and Law at American InterContinental University. He has a combined twenty years experience in civilian and military law enforcement with expertise in the area of white collar and high-tech crime investigation. Mr. Sheetz is a former appellate law clerk and graduate of the University of Miami--School of Law.
Introduction.
Acknowledgments.
1 A Definition of Computer Forensics.
Introduction.
Forensic Science.
History of Computer Forensics.
World Wide Web.
Hacker Community.
Conclusion.
Notes.
Suggested Reading.
2 Basics of Computer Forensic Concepts.
Introduction.
Understanding Digital Evidence.
Input.
Storage.
Processing.
What Computer Data Is.
Output.
Conclusion.
Notes.
Suggested Reading.
3 Preservation and Collection of Digital Evidence.
Introduction.
Rules of Evidence.
Preservation.
Collection.
Conclusion.
Note.
Suggested Reading.
4 Analysis of Digital Evidence.
Introduction.
Forensic Analysis.
Conclusion.
Notes.
Suggested Reading.
5 Reporting and Rendering the Opinion.
Introduction.
Preparing the Report.
Presentation.
Trial Process.
Conclusion.
Suggested Reading.
6 Computer Attacks.
Hackers and Phreakz Oh My.
Hackers: Unauthorized Use and Trespassing.
Wireless Hacking.
Malware.
Attacks from the Inside.
Conclusion.
Notes.
Suggested Reading.
7 Computers as Tools for Evil.
Introduction.
Computers and Crime.
Identity Theft.
Concealment.
Auction Fraud and Retail Cons.
Counterfeiting and Forgery.
Prostitution.
Securities Fraud.
Conclusion.
Notes.
8 Computer Tools and the Forensic Examination.
Introduction.
Assuming Control of the Case.
Understanding the Case.
Evaluating the Evidence.
Examining the "Live" System.
Collecting Data from a Dead System.
Imaging the Drive.
Data Extraction.
Data Analysis.
Conclusion.
Notes.
9 Presenting Digital Evidence in Court.
Introduction.
Evidence.
Types of Evidence.
Expert Witnesses.
Legal Requirements of Evidence.
Search and Seizure.
Conclusion.
Notes.
Index.
"Two chapters in Sheetz's book - "Computer Tools and the Forensic
Examination" and "Computer as Tools for Evil" - are immensely
enjoyable. The book's most important lesson is that digital
evidence is fragile and ripe for inadvertent damage if improperly
handled during an examination." (The Federal Lawyer,
March/April 2008)
"In conclusion, Mr. Sheetz's new book is comprehensible,
accessible and a valuable contribution to this increasingly
important area of our jurisprudence and justice system." (New
York Law Journal, May 29, 2007)
"This book is a well-written, useful resource on the topic of
computer forensics, enhancing the reader's understanding of
computer crime, how it occurs, and what to do about it." (Legal
Information-Alert; 5/2007)
"Solid advice for those without a strong technical background
who want to be aware of the threats lurking out there in
cyberworld." (PQ Magazine, November 2007)
Erscheint lt. Verlag | 24.3.2015 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Recht / Steuern ► Strafrecht ► Kriminologie | |
Sozialwissenschaften | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
Schlagworte | Accounting • Financial Accounting • Finanzbuchhaltung • Rechnungswesen |
ISBN-10 | 1-119-12027-6 / 1119120276 |
ISBN-13 | 978-1-119-12027-8 / 9781119120278 |
Haben Sie eine Frage zum Produkt? |
Größe: 489 KB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich