An edition of Computer forensics (2012)

Computer forensics

cybercriminals, laws, and evidence

  • 1 Want to read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 1 Want to read

Buy this book

Last edited by ImportBot
August 17, 2020 | History
An edition of Computer forensics (2012)

Computer forensics

cybercriminals, laws, and evidence

  • 1 Want to read

Balancing technicality and legal analysis, this book enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy and administration. -- Publisher description.

Publish Date
Language
English
Pages
368

Buy this book

Edition Availability
Cover of: Computer forensics
Computer forensics: cybercriminals, laws, and evidence
2012, Jones & Bartlett Learning
in English

Add another edition?

Book Details


Table of Contents

Entering the world of cybercrime
An introduction to computer forensics investigations and electronic evidence
Laws regulating access to electronic evidence
Searches and seizures of computers and electronic evidence
Cybercrime laws : which statute for which crime?
Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators!
Where is the electronic evidence and which tools can we use to find it?
Crime and incident scene : what should an investigator do?
Corporate crimes and policy violations involving computers : how to conduct a corporate investigation
E-mail forensics
Network forensics : an introduction
Mobile phones and pdas in computer forensics investigations
The pretrial and courtroom experiences of a computer forensics investigator.

Edition Notes

Includes bibliographical references and index.

Internet Archive - 2

Internet Archive 2

Published in
Sudbury, Mass

Classifications

Dewey Decimal Class
363.25/9680973
Library of Congress
KF8947.5 .M37 2012, KF8947.5.M37 2011

The Physical Object

Pagination
xiv, 368 pages
Number of pages
368

ID Numbers

Open Library
OL27790301M
ISBN 10
1449600727
ISBN 13
9781449600723
LCCN
2010050880
OCLC/WorldCat
650217978

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
August 17, 2020 Edited by ImportBot import existing book
August 2, 2020 Edited by ImportBot import existing book
December 13, 2019 Created by MARC Bot import new book