Computer evidence : collection and preservation / Christopher L.T. Brown.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | HV8079 .C65 B76 2010 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000111986 | |
![]() |
Main Library | HV8079 .C65 B76 2010 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000138884 |
Browsing Main Library shelves Close shelf browser
No cover image available | No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
||
HV8028.M34 2009 الشرطة النسائية وتطبيقاتها في الدول العربية / | HV8073 .E84 2012 Ethics in forensic science / | HV8073 .S4433 2016 Forensic science : a beginner's guide / | HV8079 .C65 B76 2010 Computer evidence : collection and preservation / | HV8079 .C65 C93 2008 Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes / | HV8079.C65 .M33 2010 Cybercrime investigation ; Comparative analysis of search for and seizure of digital evidence. | HV8079.C65 .M33 2010 Cybercrime investigation ; Comparative analysis of search for and seizure of digital evidence. |
Previous ed.: Hingham, Mass.: Charles River Media, 2005.
Includes CD-ROM.
This volume shows law enforcement, system administrators, information technology security professionals, legal professionals, and computer forensics students how to identify, collect, and maintain digital artifacts to preserve their reliability as evidence. It focuses on the first two phases of computer forensics--collection and preservation--and uses evidence dynamics as its main approach. This edition has been updated to take into account changes in federal rules of evidence and case law, as well as changes in the industry and technology. The CD-ROM contains sample batch files, forms, and demo and freeware software applications discussed in the book. Brown (network security and computer forensics, U. of California at San Diego) retired from the US Navy in the area of information warfare and network security operations.
1 2
There are no comments on this title.