Computer forensics : (Record no. 5556)

MARC details
000 -LEADER
fixed length control field 04549cam a2200373 i 4500
001 - CONTROL NUMBER
control field ocn868000190
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421131048.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140110s2015 mauak b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013048189
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781449692223
Qualifying information (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1449692222
Qualifying information (pbk.)
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000052401413
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)868000190
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency TZ-ArACH
042 ## - AUTHENTICATION CODE
Authentication code pcc
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
049 ## - LOCAL HOLDINGS (OCLC)
Holding library TZAA
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number KF8947
Item number .M37 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25/9680973
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Maras, Marie-Helen,
Dates associated with a name 1979-
Relator term author.
245 10 - TITLE STATEMENT
Title Computer forensics :
Remainder of title cybercriminals, laws, and evidence /
Statement of responsibility, etc Marie-Helen Maras, PhD, Associate Professor, John Jay College of Criminal Justice.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington, MA :
Name of publisher, distributor, etc Jones & Bartlett Learning,
Date of publication, distribution, etc 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 408 pages :
Other physical details illustrations, forms ;
Dimensions 23 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Entering the world of cybercrime -- Cybercrime : defined -- Cybercrime versus traditional crime -- Cybercrime categories -- Combating cybercrime -- 2. An introduction to computer forensics investigations and electronic evidence -- Computer forensics : what is it? -- Computer forensics investigations : the basics -- Computer forensics investigations : a four-step process -- Electronic evidence : what is it? -- Types of evidence -- Authentication of evidence -- Standards of evidence -- 3. Laws regulating access to electronic evidence -- Telecommunications and electronic communications data -- The statutory background of privacy protection and government access to data -- 4. Searches and seizures of computers and electronic evidence -- What is privacy and why is it important? -- Constitutional source of privacy protection : the Fourth Amendment -- Search warrants -- Searching a computer for evidence -- 5. Cybercrime laws : which statute for which crime? -- Computer threats and intrusions -- Financial crimes and fraud -- Intellectual property theft and economic espionage -- Personal crimes -- 6. Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- The art of deceiving : social engineering -- Scams and scam artists -- Identity theft -- Cyberbullying -- Child exploitation online -- 7. Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Defining cyberterrorism -- Criminalizing cyberterrorism -- combating cyberterrorism -- 8. Where is the electronic evidence and which tools can we use to find it? -- The location of electronic evidence -- Tools used to search and collect electronic evidence -- 9. Crime and incident scene : what should an investigator do? -- Conducting an investigation -- Special considerations for cybercrime investigations -- Identifying evidence -- Analysis of evidence -- How to handle evidence in an investigation -- Hypothetical criminal investigation -- Extracting electronic evidence -- 10. Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- Corporate investigations -- Corporate criminal activities and policy violations -- Preparing for the investigation -- Conducting the investigation -- 11. E-mail forensics -- The importance of email investigations -- Email : the basics -- How to conduct an email investigation -- Problems encountered by computer forensics investigators -- 12. Network forensics : an introduction -- Stand-alone versus networked devices -- Computer networks -- Network components -- Where can network-related evidence be found? -- Network forensics analysis tools -- Special issues when conducting investigations in a networked environment -- Preliminary analysis -- Documentation and collection -- Analysis and preservation -- 13. Mobile devices in computer forensics investigations -- Role of mobile devices -- Mobile phones and PDAs versus other electronic devices -- which tools can be used to retrieve evidence? -- Mobile device investigations -- 14. The pretrial and courtroom experiences of a computer forensics investigator -- Pretrial procedures -- Testimony and rules of evidence -- The role of the computer forensics investigator in pretrial proceedings and court.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic evidence
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation
Geographic subdivision United States.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation.
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic evidence.
Source of heading or term fast
651 #7 - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name United States.
Source of heading or term fast
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Home library Current library Date acquired Full call number Barcode Koha item type
African Court on Human and Peoples' Rights Library African Court on Human and Peoples' Rights Library 21/04/2020 KF8947 .M37 2015 10208585 Books

African Court on Human and Peoples' Rights | For Inquiries Contact » +255 272 510 510