Computer forensics : an essential guide for accountants, lawyers, and managers
Author(s)
Bibliographic Information
Computer forensics : an essential guide for accountants, lawyers, and managers
John Wiley & Sons, c2007
- : hbk
Available at 1 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
HTTP:URL=http://www.loc.gov/catdir/toc/ecip071/2006030331.html Information=Table of contents only
HTTP:URL=http://www.loc.gov/catdir/enhancements/fy0740/2006030331-b.html Information=Contributor biographical information
HTTP:URL=http://www.loc.gov/catdir/enhancements/fy0740/2006030331-d.html Information=Publisher description
Description and Table of Contents
Description
Would your company be prepared in the event of:
* Computer-driven espionage
* A devastating virus attack
* A hacker's unauthorized access
* A breach of data security?
As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks.
The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs.
Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.
Table of Contents
Introduction. Acknowledgments.
1 A Definition of Computer Forensics.
Introduction.
Forensic Science.
History of Computer Forensics.
World Wide Web.
Hacker Community.
Conclusion.
Notes.
Suggested Reading.
2 Basics of Computer Forensic Concepts.
Introduction.
Understanding Digital Evidence.
Input.
Storage.
Processing.
What Computer Data Is.
Output.
Conclusion.
Notes.
Suggested Reading.
3 Preservation and Collection of Digital Evidence.
Introduction.
Rules of Evidence.
Preservation.
Collection.
Conclusion.
Note.
Suggested Reading.
4 Analysis of Digital Evidence.
Introduction.
Forensic Analysis.
Conclusion.
Notes.
Suggested Reading.
5 Reporting and Rendering the Opinion.
Introduction.
Preparing the Report.
Presentation.
Trial Process.
Conclusion.
Suggested Reading.
6 Computer Attacks.
Hackers and Phreakz Oh My.
Hackers: Unauthorized Use and Trespassing.
Wireless Hacking.
Malware.
Attacks from the Inside.
Conclusion.
Notes.
Suggested Reading.
7 Computers as Tools for Evil.
Introduction.
Computers and Crime.
Identity Theft.
Concealment.
Auction Fraud and Retail Cons.
Counterfeiting and Forgery.
Prostitution.
Securities Fraud.
Conclusion.
Notes.
8 Computer Tools and the Forensic Examination.
Introduction.
Assuming Control of the Case.
Understanding the Case.
Evaluating the Evidence.
Examining the "Live" System.
Collecting Data from a Dead System.
Imaging the Drive.
Data Extraction.
Data Analysis.
Conclusion.
Notes.
9 Presenting Digital Evidence in Court.
Introduction.
Evidence.
Types of Evidence.
Expert Witnesses.
Legal Requirements of Evidence.
Search and Seizure.
Conclusion.
Notes.
Index.
by "Nielsen BookData"