Coverart for item
The Resource Computer forensics : computer crime scene investigation, John R. Vacca

Computer forensics : computer crime scene investigation, John R. Vacca

Label
Computer forensics : computer crime scene investigation
Title
Computer forensics
Title remainder
computer crime scene investigation
Statement of responsibility
John R. Vacca
Creator
Subject
Language
eng
Summary
"Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world."--Back cover
Cataloging source
DLC
http://library.link/vocab/creatorName
Vacca, John R
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
V33 2005
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Computer crimes
  • Forensic sciences
  • Seguridad computacional
  • Redes de computadoras
  • Ciencia forense
  • Computer crimes
  • Computer networks
  • Computer security
  • Forensic sciences
  • Criminalistiek
  • Computercriminaliteit
Label
Computer forensics : computer crime scene investigation, John R. Vacca
Link
http://catdir.loc.gov/catdir/toc/ecip059/2005007521.html
Instantiates
Publication
Accompanying material
1 CD-ROM (4 3/4 in.)
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
PART I: OVERVIEW OF COMPUTER FORENSICS TECHNOLOGY: Computer forensics fundamentals -- Types of computer forensics technology -- Types of computer forensics systems -- Vendor and computer forensics services -- PART II: COMPUTER FORENSICS EVIDENCE AND CAPTURE: Data recovery -- Evidence collection and data seizure -- Duplication and preservation of digital evidence -- Computer image verification and authentication -- PART III: COMPUTER FORENSICS ANALYSIS: Discovery of electronic evidence -- Identification of data -- Reconstructing past events -- Networks -- PART IV: COUNTERMEASURES: INFORMATION WARFARE: Fighting against macro threats: defensive strategies for governments and industry groups -- The information warfare arsenal and tactics of the military --The information warfare arsenal and tactics of terrorists and rogues -- The information warfare arsenal and tactics of private companies -- The information warfare arsenal of the future -- Surveillance tools for information warfare of the future -- Civilian casualties: the victims and refugees of information warfare -- PART V: ADVANCED COMPUTER FORENSICS SYSTEMS AND FUTURE DIRECTIONS: Advanced computer forensics -- Summary, conclusions, and recommendations -- Appendix A: Frequently asked questions -- Appendix B: Computer forensics resources -- Appendix C: Links to computer forensics and related law enforcement web pages -- Appendix D: More computer forensics cases -- Appendix E: Answers to review questions and exercises, hands-on projects, and optional team case projects by chapter -- Appendix F: Checklists by chapter -- Appendix G: About the CD-ROM -- Appendix H: Glossary of terms and acronyms
Control code
ocm56876099
Dimensions
23 cm +
Dimensions
4 3/4 in. or 12 cm.
Edition
2nd ed.
Extent
xxxii, 832 pages
File format
one file format
Isbn
9781584503897
Lccn
2005007521
Level of compression
uncompressed
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Quality assurance targets
unknown
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
optical disk
System control number
  • (Sirsi) o56876099
  • (OCoLC)56876099
System details
Minimum system requirements Adobe Acrobat 5.0 or higher, Windows 2000, XP, an Internet connection, some also require basic hardware such as Firewire, USB devices, Zip, Jaz
Label
Computer forensics : computer crime scene investigation, John R. Vacca
Link
http://catdir.loc.gov/catdir/toc/ecip059/2005007521.html
Publication
Accompanying material
1 CD-ROM (4 3/4 in.)
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
PART I: OVERVIEW OF COMPUTER FORENSICS TECHNOLOGY: Computer forensics fundamentals -- Types of computer forensics technology -- Types of computer forensics systems -- Vendor and computer forensics services -- PART II: COMPUTER FORENSICS EVIDENCE AND CAPTURE: Data recovery -- Evidence collection and data seizure -- Duplication and preservation of digital evidence -- Computer image verification and authentication -- PART III: COMPUTER FORENSICS ANALYSIS: Discovery of electronic evidence -- Identification of data -- Reconstructing past events -- Networks -- PART IV: COUNTERMEASURES: INFORMATION WARFARE: Fighting against macro threats: defensive strategies for governments and industry groups -- The information warfare arsenal and tactics of the military --The information warfare arsenal and tactics of terrorists and rogues -- The information warfare arsenal and tactics of private companies -- The information warfare arsenal of the future -- Surveillance tools for information warfare of the future -- Civilian casualties: the victims and refugees of information warfare -- PART V: ADVANCED COMPUTER FORENSICS SYSTEMS AND FUTURE DIRECTIONS: Advanced computer forensics -- Summary, conclusions, and recommendations -- Appendix A: Frequently asked questions -- Appendix B: Computer forensics resources -- Appendix C: Links to computer forensics and related law enforcement web pages -- Appendix D: More computer forensics cases -- Appendix E: Answers to review questions and exercises, hands-on projects, and optional team case projects by chapter -- Appendix F: Checklists by chapter -- Appendix G: About the CD-ROM -- Appendix H: Glossary of terms and acronyms
Control code
ocm56876099
Dimensions
23 cm +
Dimensions
4 3/4 in. or 12 cm.
Edition
2nd ed.
Extent
xxxii, 832 pages
File format
one file format
Isbn
9781584503897
Lccn
2005007521
Level of compression
uncompressed
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Quality assurance targets
unknown
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
optical disk
System control number
  • (Sirsi) o56876099
  • (OCoLC)56876099
System details
Minimum system requirements Adobe Acrobat 5.0 or higher, Windows 2000, XP, an Internet connection, some also require basic hardware such as Firewire, USB devices, Zip, Jaz

Library Locations

    • Waubonsee: Sugar Grove Campus - Todd LibraryBorrow it
      Collins Hall 2nd Floor Waubonsee Community College Route 47 at Waubonsee Drive, Sugar Grove, IL, 60554-9454, US
      41.7974 -88.45785
Processing Feedback ...