LEADER 05313nam 2200637 a 450 001 9910785099903321 005 20230120005211.0 010 $a1-281-09638-5 010 $a9786611096380 010 $a0-08-055608-6 035 $a(CKB)1000000000408077 035 $a(EBL)328333 035 $a(OCoLC)190858820 035 $a(SSID)ssj0000073804 035 $a(PQKBManifestationID)11171369 035 $a(PQKBTitleCode)TC0000073804 035 $a(PQKBWorkID)10116455 035 $a(PQKB)10476502 035 $a(Au-PeEL)EBL328333 035 $a(CaPaEBR)ebr10204232 035 $a(CaONFJC)MIL109638 035 $a(CaSebORM)9781597492287 035 $a(MiAaPQ)EBC328333 035 $a(EXLCZ)991000000000408077 100 $a20080110d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe best damn cybercrime and digital forensics book period$b[electronic resource] /$fKevin Cardwell [et al.] 205 $a1st edition 210 $aRockland, Mass. $cSyngress ;$aOxford $cElsevier Science [distributor]$d2007 215 $a1 online resource (734 p.) 300 $aIncludes index. 311 $a1-59749-228-0 327 $aFront Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody 327 $aCollection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?" 327 $aSOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience 327 $aSpatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers! 327 $aCables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works? 327 $aConduct Objective Analysis and Reporting 330 $aElectronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion doll 606 $aComputer crimes$xInvestigation 606 $aElectronic discovery (Law) 615 0$aComputer crimes$xInvestigation. 615 0$aElectronic discovery (Law) 676 $a363.25968 700 $aCardwell$b Kevin$01474565 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785099903321 996 $aThe best damn cybercrime and digital forensics book period$93688334 997 $aUNINA