计算机法医学:会计师、律师与管理者基本指南

计算机法医学:会计师、律师与管理者基本指南
作 者: Michael Sheetz 
出版社: 吉林长白山
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

  MICHAEL SHEETZ, JD, is Assistant Professor of Criminal Justice and Law at American InterContinental University. He has a combined twenty years experience in civilian and military law enforcement with expertise in the area of white collar and high-tech cri

内容简介

Would your company be prepared in the event of:* Computer-driven espionage* A devastating virus attack* A hacker's unauthorized access* A breach of data security?As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks.The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs.Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the ...

图书目录

Introduction.

Acknowledgments.

1 A Definition of Computer Forensics.

 Introduction.

 Forensic Science.

 History of Computer Forensics.

 World Wide Web.

 Hacker Community.

 Conclusion.

 Notes.

 Suggested Reading.

2 Basics of Computer Forensic Concepts.

 Introduction.

 Understanding Digital Evidence.

 Input.

 Storage.

 Processing.

 What Computer Data Is.

 Output.

 Conclusion.

 Notes.

 Suggested Reading.

3 Preservation and Collection of Digital Evidence.

 Introduction.

 Rules of Evidence.

 Preservation.

 Collection.

 Conclusion.

 Note.

 Suggested Reading.

4 Analysis of Digital Evidence.

 Introduction.

 Forensic Analysis.

 Conclusion.

 Notes.

 Suggested Reading.

5 Reporting and Rendering the Opinion.

 Introduction.

 Preparing the Report.

 Presentation.

 Trial Process.

 Conclusion.

 Suggested Reading.

6 Computer Attacks.

 Hackers and Phreakz Oh My.

 Hackers: Unauthorized Use and Trespassing.

 Wireless Hacking.

 Malware.

 Attacks from the Inside.

 Conclusion.

 Notes.

 Suggested Reading.

7 Computers as Tools for Evil.

 Introduction.

 Computers and Crime.

 Identity Theft.

 Concealment.

 Auction Fraud and Retail Cons.

 Counterfeiting and Forgery.

 Prostitution.

 Securities Fraud.

 Conclusion.

 Notes.

8 Computer Tools and the Forensic Examination.

 Introduction.

 Assuming Control of the Case.

 Understanding the Case.

 Evaluating the Evidence.

 Examining the "Live" System.

 Collecting Data from a Dead System.

 Imaging the Drive.

 Data Extraction.

 Data Analysis.

 Conclusion.

 Notes.

9 Presenting Digital Evidence in Court.

 Introduction.

 Evidence.

 Types of Evidence.

 Expert Witnesses.

 Legal Requirements of Evidence.

 Search and Seizure.

 Conclusion.

 Notes.

 Index.