TY - BOOK AU - Sheetz,Michael TI - Computer forensics: an essential guide for accountants, lawyers, and managers SN - 9781119202011 AV - HV8079.C65 S44 2007eb U1 - 363.25 22 PY - 2007/// CY - Hoboken, N.J. PB - John Wiley & Sons KW - Computer crimes KW - Investigation KW - CriminalitĂ© informatique KW - EnquĂȘtes KW - LAW KW - Forensic Science KW - bisacsh KW - fast KW - Electronic books N1 - Title from title screen; Includes bibliographical references and index; A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index N2 - Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. Th UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=492761 ER -