SmartSellTM - The New Way to Sell Online

Shop over a million Toys in our Huge New Range

Computer Forensics
By

Rating
Product Details

Table of Contents

COMPUTER FORENSIC INVESTIGATION BASICS Computer Forensic Investigation Basics Chapter Objectives Introduction Forensics Defined The Four-Step Process Chapter Summary Terms Review Questions Policies, Standards, Laws, and Legal Processes Chapter Objectives Introduction Laws and Legal Issues Chapter Summary Terms Review Questions Electronic Forensic Examination Categories Chapter Objectives Introduction Chapter Summary Terms Review Questions Computer, Internet, and Electronic Crimes Chapter Objectives Introduction Chapter Summary Terms Review Questions Computers, Electronics, and Networking Environment Chapter Objectives Introduction Chapter Summary Terms Review Questions Investigative Tools, Technical Training, and Forensic Equipment Chapter Objectives Introduction Chapter Summary Terms Review Questions FORENSIC EVIDENCE COLLECTION AND MANAGEMENT Managing the Crime/Incident Scene Chapter Objectives Introduction Chapter Summary Terms Review Questions Investigating Computer Center Incidents Chapter Objectives Introduction Chapter Summary Terms Review Questions Computer Systems Disk and File Structures Chapter Objectives Introduction Chapter Summary Terms Review Questions The Computer and Electronic Forensic Lab Chapter Objectives Introduction Chapter Summary Terms Review Questions Extracting Computer and Electronic Evidence Chapter Objectives Introduction Chapter Summary Terms Review Questions E-mail and Internet Investigations Chapter Objectives Introduction Chapter Summary Terms Review Questions Mobile Phone and PDA Investigations Chapter Objectives Introduction Chapter Summary Terms Review Questions Court Preparation, Presentations, and Testimony Chapter Objectives Introduction Chapter Summary Terms Review Questions Appendix A Investigation Forms Examination Forms Appendix B Forensic Cases and Exercises Appendix C Answers to Review Questions Appendix D Binary and Hexadecimal Number Systems

About the Author

Georgia Southern University, Statesboro, USA

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Networking » Security
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Computer Forensics: Evidence, Collection and Management on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Back to top