Computer forensics : [Book] : cybercriminals, laws, and evidence / Marie-Helen Maras, PhD, Associate Professor, John Jay College of Criminal Justice.
Material type: TextPublisher: Burlington, MA : Jones & Bartlett Learning, 2015Edition: Second editionDescription: xv, 408 pages : illustrations, forms ; 23 cm Media type:- unmediated
- volume
- 9781449692223 (pbk.)
- 1449692222 (pbk.)
- 363.25 9680973 23
- 363.259680973
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Junaid Zaidi Library, COMSATS University Islamabad | 363.259680973 MAR-C (Browse shelf(Opens below)) | Available | 51572 | ||
Books | Junaid Zaidi Library, COMSATS University Islamabad | 363.259680973 MAR-C (Browse shelf(Opens below)) | Available | 51573 |
Browsing Junaid Zaidi Library, COMSATS University Islamabad shelves Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
363.25968 HOL-C 62871 Cybercrime and digital forensics an introduction / | 363.25968 MOU-D 62874 Biology how life works / | 363.25968 SAM-B The basics of digital forensics the primer for getting started in digital forensics / | 363.259680973 MAR-C Computer forensics : cybercriminals, laws, and evidence / | 363.259680973 MAR-C Computer forensics : cybercriminals, laws, and evidence / | 363.287 MAR The self Urdu teacher / | 363.3 EAR Earthquake reconstruction and rehabilitation authority review 2011. |
Includes bibliographical references and index.
Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile devices in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator.
An Updated Edition of the Definitive Computer Forensics Text Updated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy, and administration.
All.
There are no comments on this title.