Computer forensics an essential guide for accountants, lawyers, and managers
(eBook)

Book Cover
Average Rating
Contributors
Published
Hoboken, N.J. : John Wiley & Sons, Inc., c2007.
Physical Desc
xvii, 152 pages
Status

More Details

Format
eBook
Language
English

Notes

Bibliography
Includes bibliographical references and index.
Reproduction
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reading Recommendations & More

Citations

APA Citation, 7th Edition (style guide)

Sheetz, M. (2007). Computer forensics: an essential guide for accountants, lawyers, and managers . John Wiley & Sons, Inc..

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Sheetz, Michael. 2007. Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers. John Wiley & Sons, Inc.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Sheetz, Michael. Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers John Wiley & Sons, Inc, 2007.

MLA Citation, 9th Edition (style guide)

Sheetz, Michael. Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers John Wiley & Sons, Inc., 2007.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
30a51591-fe03-2587-29a0-1d757bd9b9e2-eng
Go To Grouped Work

Grouping Information

Grouped Work ID30a51591-fe03-2587-29a0-1d757bd9b9e2-eng
Full titlecomputer forensics an essential guide for accountants lawyers and managers
Authorsheetz michael
Grouping Categorybook
Last Update2022-06-07 21:23:19PM
Last Indexed2024-05-15 03:00:16AM

Book Cover Information

Image Sourcedefault
First LoadedMar 29, 2024
Last UsedMar 29, 2024

Marc Record

First DetectedAug 09, 2021 12:14:19 PM
Last File Modification TimeNov 22, 2021 08:02:32 AM

MARC Record

LEADER03297nam a2200421 a 4500
001EBC694238
003MiAaPQ
006m    E |      
007cr cn|||||||||
008060912s2007    nju     sb    001 0 eng d
010 |z  2006030331
020 |z 9780471789321 (cloth)
020 |z 0471789321 (cloth)
020 |z 9780470124024 (e-book)
035 |a (Sirsi) EBC694238
035 |a (Sirsi) EBC694238
035 |a (MiAaPQ)EBC694238
035 |a (Au-PeEL)EBL694238
035 |a (CaPaEBR)ebr10713577
035 |a (CaONFJC)MIL494657
035 |a (OCoLC)922903824
040 |a MiAaPQ|c MiAaPQ|d MiAaPQ
050 4|a HV8079.C65|b S44 2007
08204|a 363.25|2 22
1001 |a Sheetz, Michael.
24510|a Computer forensics|h [eBook] :|b an essential guide for accountants, lawyers, and managers /|c Michael Sheetz.
260 |a Hoboken, N.J. :|b John Wiley & Sons, Inc.,|c c2007.
300 |a xvii, 152 p.
504 |a Includes bibliographical references and index.
5050 |a A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? -- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?live? system -- Collecting data from a dead system -- Imaging the drive -- Data extraction -- Data analysis -- Conclusion -- Presenting digital evidence in court -- Introduction -- Evidence -- Types of evidence -- Expert witnesses -- Legal requirements of evidence -- Search and seizure -- Conclusion -- Index.
533 |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
650 0|a Computer crimes|x Investigation.
655 4|a Electronic books.
7102 |a ProQuest (Firm)
85640|u http://ebookcentral.proquest.com/lib/yavapai-ebooks/detail.action?docID=694238|x Yavapai College|y Yavapai College users click here to access
85640|u http://ebookcentral.proquest.com/lib/prescottcollege-ebooks/detail.action?docID=694238|x Prescott College|y Prescott College users click here to access
85640|u http://ebookcentral.proquest.com/lib/yln-ebooks/detail.action?docID=694238|x Yavapai Library Network|y All other users click here to access
945 |a E-Book