Digital Evidence and Computer Crime Forensic Science, Computers and The Internet 2nd Ed [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Digital Evidence and Computer Crime Forensic Science, Computers and The Internet 2nd Ed [Electronic resources] - نسخه متنی

Eoghan Casey

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید









Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, Second Edition








byEoghan Casey

ISBN:0121631044

Academic Press

2004

This book explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Readers will also learn about relevant legal issues and will be introduced to deductive criminal profiling.












































































































































































></TD><br/><TD WIDTH=Digital Evidence and Computer Crime—Forensic Science, Computers and the Internet, Second Edition
></TD><br/><TD WIDTH=Introduction
Part 1 -
Digital Investigation
></TD><br/><TD WIDTH=Chapter 1-
Digital Evidence and Computer Crime
></TD><br/><TD WIDTH=Chapter 2-
History and Terminology of Computer Crime Investigation
></TD><br/><TD WIDTH=Chapter 3-
Technology and Law
></TD><br/><TD WIDTH=Chapter 4-
The Investigative Process
></TD><br/><TD WIDTH=Chapter 5-
Investigative Reconstruction with Digital Evidence
></TD><br/><TD WIDTH=Chapter 6-
Modus Operandi, Motive, and Technology
></TD><br/><TD WIDTH=Chapter 7-
Digital Evidence in the Courtroom
Part 2 -
Computers
></TD><br/><TD WIDTH=Chapter 8-
Computer Basics for Digital Investigators
></TD><br/><TD WIDTH=Chapter 9-
Applying Forensic Science to Computers
></TD><br/><TD WIDTH=Chapter 10-
Forensic Examination of Windows Systems
></TD><br/><TD WIDTH=Chapter 11-
Forensic Examination of Unix Systems
></TD><br/><TD WIDTH=Chapter 12-
Forensic Examination of Macintosh Systems
></TD><br/><TD WIDTH=Chapter 13-
Forensic Examination of Handheld Devices
Part 3 -
Networks
></TD><br/><TD WIDTH=Chapter 14-
Network Basics for Digital Investigators
></TD><br/><TD WIDTH=Chapter 15-
Applying Forensic Science to Networks
></TD><br/><TD WIDTH=Chapter 16-
Digital Evidence on Physical and Data-Link Layers
></TD><br/><TD WIDTH=Chapter 17-
Digital Evidence at the Network and Transport Layers
></TD><br/><TD WIDTH=Chapter 18-
Digital Evidence on the Internet
Part 4 -
Investigating Computer Crime
></TD><br/><TD WIDTH=Chapter 19-
Investigating Computer Intrusions
></TD><br/><TD WIDTH=Chapter 20-
Sex Offenders on the Internet
></TD><br/><TD WIDTH=Chapter 21-
Cyberstalking
></TD><br/><TD WIDTH=Chapter 22-
Digital Evidence as Alibi
Part 5 -
Guidelines
></TD><br/><TD WIDTH=Chapter 23-
Digital Evidence Handling Guidelines
></TD><br/><TD WIDTH=Chapter 24-
Digital Evidence Examination Guidelines
></TD><br/><TD WIDTH=Bibliography
></TD><br/><TD WIDTH=Glossary
></TD><br/><TD WIDTH=Author Index
></TD><br/><TD WIDTH=Subject Index
></TD><br/><TD WIDTH=List of Figures
></TD><br/><TD WIDTH=List of Tables
></TD><br/><TD WIDTH=List of Case Examples

/ 280