My Account Log in

1 option

Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes / Albert J. Marcella, Robert S. Greenfield, editors.

Van Pelt Library HV8079.C65 C93 2002
Loading location information...

By Request Item cannot be checked out at the library but can be requested.

Log in to request item
Format:
Book
Contributor:
Marcella, Albert J.
Greenfield, Robert, 1961-
Harry E. Humphreys Book Fund.
Language:
English
Subjects (All):
Computer crimes--Investigation--Handbooks, manuals, etc.
Computer crimes.
Computer crimes--Investigation.
Genre:
Handbooks and manuals.
Physical Description:
xx, 443 pages : illustrations ; 26 cm
Place of Publication:
Boca Raton, Fla. : Auerbach Publications, [2002]
Summary:
Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look behind the closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.
Contents:
Section I Cyber Forensics
1 The Goal of the Forensic Investigation / Carol Stucki 3
2 How to Begin a Nonliturgical Forensic Investigation / Carol Stucki 19
3 The Liturgical Forensic Examination: Tracing Activity on a Windows-Based Desktop / Robert S. Greenfield 47
4 Basics of Internet Abuse: What Is Possible and Where to Look Under the Hood / John W. Rado 79
5 Tools of the Trade: Automated Tools Used to Secure a System Throughout the Stages of a Forensic Investigation / Brent Deterdeing 97
6 Network Intrusion Management and Profiling / Steven Schlarman 117
7 Cyber Forensics and the Legal System / Abigail Abraham 133
Section II Federal and International Guidelines
8 Searching and Seizing Computers and Obtaining Electronic Evidence 149
9 Computer Crime Policy and Programs 179
10 International Aspects of Computer Crime 205
11 Privacy Issues in the High-Tech Context / The Department of Justice Privacy Council 221
12 Critical Infrastructure Protection 227
13 Electronic Commerce: Legal Issues / The Electronic Commerce Working Group (ECWG), Department of Justice 249
14 Legal Considerations in Designing and Implementing Electronic Processes: A Guide for Federal Agencies 287
15 Encryption 335
16 Intellectual Property 361
Section III Forensics Tools
17 Forensic and Security Assessment Tools 375
18 How to Report Internet-Related Crime 389
19 Internet Security: An Auditor's Basic Checklist 391.
Notes:
Includes bibliographical references (pages 415-423) and index.
Local Notes:
Acquired for the Penn Libraries with assistance from the Harry E. Humphreys Book Fund.
ISBN:
0849309557
OCLC:
48140454

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account