Bild 1 von 1

Galerie
Bild 1 von 1

Computerforensik: Ein wesentlicher Leitfaden für Buchhalter, Anwälte und...-
US $6,70
Ca.EUR 5,76
Artikelzustand:
Neuwertig
Buch, das wie neu aussieht, aber bereits gelesen wurde. Der Einband weist keine sichtbaren Gebrauchsspuren auf. Bei gebundenen Büchern ist der Schutzumschlag vorhanden (sofern zutreffend). Alle Seiten sind vollständig vorhanden, es gibt keine zerknitterten oder eingerissenen Seiten und im Text oder im Randbereich wurden keine Unterstreichungen, Markierungen oder Notizen vorgenommen. Der Inneneinband kann minimale Gebrauchsspuren aufweisen. Minimale Gebrauchsspuren. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
US $5,22 (ca. EUR 4,48) USPS Media MailTM.
Standort: Boca Raton, Florida, USA
Lieferung:
Lieferung zwischen Do, 14. Aug und Mo, 18. Aug nach 94104 bei heutigem Zahlungseingang
Rücknahme:
Keine Rücknahme.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:134681800909
Artikelmerkmale
- Artikelzustand
- Subject
- Forensics
- ISBN
- 9780471789321
Über dieses Produkt
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471789321
ISBN-13
9780471789321
eBay Product ID (ePID)
56999042
Product Key Features
Number of Pages
176 Pages
Publication Name
Computer Forensics : an Essential Guide for Accountants, Lawyers, and Managers
Language
English
Publication Year
2007
Subject
Decision-Making & Problem Solving
Type
Textbook
Subject Area
Business & Economics
Format
Hardcover
Dimensions
Item Height
0.7 in
Item Weight
13.4 Oz
Item Length
9.2 in
Item Width
6.5 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2006-030331
Dewey Edition
22
Reviews
"Two chapters in Sheetz's book - "Computer Tools and the Forensic Examination" and "Computer as Tools for Evil" - are immensely enjoyable. The book's most important lesson is that digital evidence is fragile and ripe for inadvertent damage if improperly handled during an examination." ( The Federal Lawyer , March/April 2008) "In conclusion, Mr. Sheetz's new book is comprehensible, accessible and a valuable contribution to this increasingly important area of our jurisprudence and justice system." ( New York Law Journal, May 29, 2007) "This book is a well-written, useful resource on the topic of computer forensics, enhancing the reader's understanding of computer crime, how it occurs, and what to do about it." ( Legal Information-Alert ; 5/2007) "Solid advice for those without a strong technical background who want to be aware of the threats lurking out there in cyberworld." ( PQ Magazine , November 2007), "In conclusion, Mr. Sheetz's new book is comprehensible, accessible and a valuable contribution to this increasingly important area of our jurisprudence and justice system." ("New York Law Journal," May 29, 2007), "In conclusion, Mr. Sheetz's new book is comprehensible, accessible and a valuable contribution to this increasingly important area of our jurisprudence and justice system." ( New York Law Journal, May 29, 2007) "Solid advice for those without a strong technical background who want to be aware of the threats lurking...in cyberworld." ( PQ Magazine , November 2007)
Illustrated
Yes
Dewey Decimal
363.25
Table Of Content
Introduction. Acknowledgments. 1 A Definition of Computer Forensics. Introduction. Forensic Science. History of Computer Forensics. World Wide Web. Hacker Community. Conclusion. Notes. Suggested Reading. 2 Basics of Computer Forensic Concepts. Introduction. Understanding Digital Evidence. Input. Storage. Processing. What Computer Data Is. Output. Conclusion. Notes. Suggested Reading. 3 Preservation and Collection of Digital Evidence. Introduction. Rules of Evidence. Preservation. Collection. Conclusion. Note. Suggested Reading. 4 Analysis of Digital Evidence. Introduction. Forensic Analysis. Conclusion. Notes. Suggested Reading. 5 Reporting and Rendering the Opinion. Introduction. Preparing the Report. Presentation. Trial Process. Conclusion. Suggested Reading. 6 Computer Attacks. Hackers and Phreakz Oh My. Hackers: Unauthorized Use and Trespassing. Wireless Hacking. Malware. Attacks from the Inside. Conclusion. Notes. Suggested Reading. 7 Computers as Tools for Evil. Introduction. Computers and Crime. Identity Theft. Concealment. Auction Fraud and Retail Cons. Counterfeiting and Forgery. Prostitution. Securities Fraud. Conclusion. Notes. 8 Computer Tools and the Forensic Examination. Introduction. Assuming Control of the Case. Understanding the Case. Evaluating the Evidence. Examining the "Live" System. Collecting Data from a Dead System. Imaging the Drive. Data Extraction. Data Analysis. Conclusion. Notes. 9 Presenting Digital Evidence in Court. Introduction. Evidence. Types of Evidence. Expert Witnesses. Legal Requirements of Evidence. Search and Seizure. Conclusion. Notes. Index.
Synopsis
Would your company be prepared in the event of: ∗ Computer-driven espionage ∗ A devastating virus attack ∗ A hacker's unauthorized access ∗ A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity., Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs. Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes. If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared., Would your company be prepared in the event of: Computer-driven espionage A devastating virus attack A hacker's unauthorized access A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs. Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt and devastate a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes. If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.
LC Classification Number
HV8079.C65S44 2007
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
campanelli
100% positive Bewertungen•691 Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (285)
- i***i (251)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufPerfect- exactly as described and love it. Good response to questions.
- s***a (438)- Bewertung vom Käufer.Letztes JahrBestätigter KaufBook arrived in good condition, as described. Good seller. Thx.Lunch with Buddha, Merullo, Roland, Good Book (Nr. 134997473192)
- i***c (131)- Bewertung vom Käufer.Letzter MonatBestätigter KaufGood shipping