Computer EvidenceComputer Evidence
Collection and Preservation
Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
eBook, 2010
Current format, eBook, 2010, 2nd ed, All copies in use.eBook, 2010
Current format, eBook, 2010, 2nd ed, All copies in use. Offered in 0 more formatsThis volume shows law enforcement, system administrators, information technology security professionals, legal professionals, and computer forensics students how to identify, collect, and maintain digital artifacts to preserve their reliability as evidence. It focuses on the first two phases of computer forensics--collection and preservation--and uses evidence dynamics as its main approach. This edition has been updated to take into account changes in federal rules of evidence and case law, as well as changes in the industry and technology. The CD-ROM contains sample batch files, forms, and demo and freeware software applications discussed in the book. Brown (network security and computer forensics, U. of California at San Diego) retired from the US Navy in the area of information warfare and network security operations. Annotation ©2009 Book News, Inc., Portland, OR (booknews.com)
As computers and data systems continue to evolve, they expand into every facet of our personal and business lives. Never before has our society been so information and technology driven. Because computers, data communications, and data storage devices have become ubiquitous, few crimes or civil disputes do not involve them in some way. This book teaches law enforcement, system administrators, information technology security professionals, legal professionals, and students of computer forensics how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. It has been updated to take into account changes in federal rules of evidence and case law that directly address digital evidence, as well as to expand upon portable device collection.
As computers and data systems continue to evolve, they expand into every facet of our personal and business lives. Never before has our society been so information and technology driven. Because computers, data communications, and data storage devices have become ubiquitous, few crimes or civil disputes do not involve them in some way. This book teaches law enforcement, system administrators, information technology security professionals, legal professionals, and students of computer forensics how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. It has been updated to take into account changes in federal rules of evidence and case law that directly address digital evidence, as well as to expand upon portable device collection.
Title availability
About
Subject and genre
Details
Publication
- Boston, Mass. : Course Technology, Ă2010.
Opinion
More from the community
Community lists featuring this title
There are no community lists featuring this title
Community contributions
There are no quotations from this title
There are no quotations from this title
From the community