Handbook of computer crime investigation : forensic tools and technology /
Detailed technical information is presented that can be used to help solve crime involving computers, for professionals who are already familiar with digital evidence. The handbook tells how to locate and use evidence in computer hard drives, shared networks, wireless devices, and embedded systems....
Saved in:
Other Authors: | |
---|---|
Format: | Book |
Language: | English |
Published: |
San Diego, Calif. :
Academic Press,
c2002
San Diego, Calif. : [2002] |
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 06958nam a2200913Ia 4500 | ||
---|---|---|---|
001 | 5c78e85f-2f07-42ae-87c0-e2576e94a121 | ||
005 | 20240903000000.0 | ||
008 | 011119t20022002cau b 001 0 eng d | ||
010 | |a 2001095720 | ||
010 | |a 2001095720 | ||
010 | |a ^^2001095720 | ||
019 | |a 48450441 |a 788697286 | ||
020 | |a 0121631036 | ||
035 | |9 FPL8436YL | ||
035 | |a (NcD)003047870DUK01 | ||
035 | |a (OCoLC)47194007 |z (OCoLC)48450441 |z (OCoLC)788697286 | ||
035 | |a (OCoLC)47194007 | ||
035 | |a (OCoLC)ocm47194007 | ||
035 | |a (OCoLC)ocn686466440 | ||
035 | |a (PU)3143061-penndb-Voyager | ||
035 | |a 3143061 | ||
035 | |a 47194007 | ||
035 | |a 4905220 | ||
040 | |a TOE |b eng |c TOE |d CUM |d NDD | ||
040 | |a TOE |b eng |c TOE |d CUM |d PU | ||
040 | |a TOE |c TOE |d CUM |d IQU |d DLC |d UtOrBLW |d OrLoB-B | ||
040 | |a TOE |c TOE |d CUM |d IQU |d DLC | ||
040 | |a TOE |c TOE |d CUM | ||
042 | |a pcc | ||
049 | |a PAUU | ||
050 | 0 | 0 | |a HV8079.C65 |b H36 2002 |
050 | 9 | 9 | |a HV8079.C65 |b H36 2002 |
079 | |a ocm47194007 | ||
082 | 0 | 0 | |a 363.25/968 |2 21 |
090 | |a HV8079.C65 |b H36 2002 | ||
092 | |a 363.25968 |b H236, 2002 | ||
245 | 0 | 0 | |a Handbook of computer crime investigation : |b forensic tools and technology / |c edited by Eoghan Casey |
246 | 3 | 0 | |a Computer crime investigation |
260 | |a San Diego, Calif. : |b Academic Press, |c c2002 | ||
264 | 1 | |a San Diego, Calif. : |b Academic Press, |c [2002] | |
264 | 4 | |c ©2002 | |
300 | |a xiv, 448 p. : |b ill. ; |c 24 cm | ||
300 | |a xiv, 448 p. ; |c 24 cm | ||
300 | |a xiv, 448 pages ; |c 24 cm | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a unmediated |b n |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a This WorldCat-derived record is shareable under Open Data Commons ODC-BY, with attribution to OCLC |5 CTY | ||
504 | |a Includes bibliographical references and index | ||
504 | |a Includes bibliographical references and indexes | ||
505 | 0 | |a The other side of civil discovery / Troy Larson -- The EnCase process / John Patzakis -- Incident response tools / Steve Romig -- NFR security / Karen Frederick -- Tool testing and analytical methodology / Curt Bryson and Scott Stevens -- Forensic analysis of Windows systems / Bob Sheldon -- UNIX system analysis / Keith Seglem, Mark Luque, and Sigurd Murphy -- Network analysis / Eoghan Casey, Troy Larson, and H. Morrow Long -- Wireless network analysis / K. Edward Gibbs and David F. Clark -- Embedded systems analysis / Ronald van der Knijff -- Homicide and child pornography / J.J. McLean -- Investigating internet gambling / Todd G. Shipley -- Computer intrusions / Steve Romig | |
505 | 0 | 0 | |g Ch. 1 |t Introduction / |r Eoghan Casey and Keith Seglem -- |g Ch. 2. |t The Other Side of Civil Discovery / |r Troy Larson -- |g Ch. 3. |t The Encase Process / |r John Patzakis -- |g Ch. 4. |t Incident Response Tools / |r Steve Romig -- |g Ch. 5. |t NFR Security / |r Karen Frederick -- |g Ch. 6. |t Tool Testing and Analytical Methodology / |r Curt Bryson and Scott Stevens -- |g Ch. 7. |t Forensic Analysis of Windows Systems / |r Bob Sheldon -- |g Ch. 8. |t Unix System Analysis / |r Keith Seglem, Mark Luque and Sigurd Murphy -- |g Ch. 9. |t Network Analysis / |r Eoghan Casey, Troy Larson and H. Morrow Long -- |g Ch. 10. |t Wireless Network Analysis / |r K. Edward Gibbs and David F. Clark -- |g Ch. 11. |t Embedded Systems Analysis / |r Ronald van der Knijff -- |g Ch. 12. |t Homicide and Child Pornography / |r J. J. McLean -- |g Ch. 13. |t Investigating Internet Gambling / |r Todd G. Shipley -- |g Ch. 14. |t Computer Intrusions / |r Steve Romig. |
520 | |a Detailed technical information is presented that can be used to help solve crime involving computers, for professionals who are already familiar with digital evidence. The handbook tells how to locate and use evidence in computer hard drives, shared networks, wireless devices, and embedded systems. Advantages and disadvantages of software and hardware for collecting and analyzing digital evidence are discussed, and instructions are given for collecting and analyzing digital evidence in common situations. Case examples demonstrate technical, legal, and practical challenges. Casey is a system security administrator for Yale University. Annotation copyrighted by Book News Inc., Portland, OR | ||
583 | 1 | |a committed to retain |c 20181001 |d in perpetuity |f ReCAP Shared Collection |5 HUL |8 222053048580003941 | |
650 | 0 | |a Computer crimes |x Investigation |v Handbooks, manuals, etc | |
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Evidence, Criminal |v Handbooks, manuals, etc | |
650 | 0 | |a Evidence, Criminal | |
650 | 0 | |a Forensic sciences |v Handbooks, manuals, etc | |
650 | 0 | |a Forensic sciences | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
650 | 7 | |a Evidence, Criminal |2 fast | |
650 | 7 | |a Forensic sciences |2 fast | |
655 | 7 | |a Handbooks and manuals |2 fast | |
700 | 1 | |a Casey, Eoghan |0 http://viaf.org/viaf/sourceID/LC|no00092111 | |
700 | 1 | |a Casey, Eoghan |1 http://viaf.org/viaf/6944400/ | |
700 | 1 | |a Casey, Eoghan | |
776 | 0 | |w (OCoLC)790805953 |w (NO-TrBIB)120753057 | |
999 | 1 | 0 | |i 5c78e85f-2f07-42ae-87c0-e2576e94a121 |l 4905220 |s US-CTY |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p |
999 | 1 | 0 | |i 5c78e85f-2f07-42ae-87c0-e2576e94a121 |l 6243701 |s US-ICU |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p |
999 | 1 | 0 | |i 5c78e85f-2f07-42ae-87c0-e2576e94a121 |l 990087553950203941 |s US-MH |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p |
999 | 1 | 0 | |i 5c78e85f-2f07-42ae-87c0-e2576e94a121 |l 990030478700108501 |s US-NCD |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p |
999 | 1 | 0 | |i 5c78e85f-2f07-42ae-87c0-e2576e94a121 |l 9931430613503681 |s US-PU |m handbook_of_computer_crime_investigationforensic_tools_and_technology______2002_______acadea___________________________________________________________________________p |
999 | 1 | 1 | |l 4905220 |s ISIL:US-CTY |t BKS |a sml |b 39002056528319 |c HV8079 C65 H36 2002 (LC) |g 1 |v 1 piece |x circ |y 3914929 |p LOANABLE |
999 | 1 | 1 | |l 6243701 |s ISIL:US-ICU |t BKS |a DLL-Law |b 62691701 |c HV8079.C65 H36 2002 |d Library of Congress classification |y 8140906 |p LOANABLE |
999 | 1 | 1 | |l 990087553950203941 |s ISIL:US-MH |t BKS |a LAW HD |b 32044066221425 |c HV8079.C65 H36 2002 |d 0 |x 01 BOOK |y 232053048530003941 |p LOANABLE |
999 | 1 | 1 | |l 990030478700108501 |s ISIL:US-NCD |t BKS |a LSC PSK |b D02357722S |c HV8079.C65 H36 2002 |d 0 |x BOOK |y 23617671510008501 |p LOANABLE |
999 | 1 | 1 | |l 9931430613503681 |s ISIL:US-PU |t BKS |a VanPeltLib vanp |b 31198032390747 |c HV8079.C65 H36 2002 |d 0 |x BOOK |y 23358552390003681 |p LOANABLE |