Computer forensics : (Record no. 5556)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 04549cam a2200373 i 4500 |
| 001 - CONTROL NUMBER | |
| control field | ocn868000190 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20200421131048.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 140110s2015 mauak b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2013048189 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781449692223 |
| Qualifying information | (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1449692222 |
| Qualifying information | (pbk.) |
| 029 1# - (OCLC) | |
| OCLC library identifier | AU@ |
| System control number | 000052401413 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)868000190 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | TZ-ArACH |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 043 ## - GEOGRAPHIC AREA CODE | |
| Geographic area code | n-us--- |
| 049 ## - LOCAL HOLDINGS (OCLC) | |
| Holding library | TZAA |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | KF8947 |
| Item number | .M37 2015 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 363.25/9680973 |
| Edition number | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Maras, Marie-Helen, |
| Dates associated with a name | 1979- |
| Relator term | author. |
| 245 10 - TITLE STATEMENT | |
| Title | Computer forensics : |
| Remainder of title | cybercriminals, laws, and evidence / |
| Statement of responsibility, etc | Marie-Helen Maras, PhD, Associate Professor, John Jay College of Criminal Justice. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | Second edition. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Burlington, MA : |
| Name of publisher, distributor, etc | Jones & Bartlett Learning, |
| Date of publication, distribution, etc | 2015. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xv, 408 pages : |
| Other physical details | illustrations, forms ; |
| Dimensions | 23 cm |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | 1. Entering the world of cybercrime -- Cybercrime : defined -- Cybercrime versus traditional crime -- Cybercrime categories -- Combating cybercrime -- 2. An introduction to computer forensics investigations and electronic evidence -- Computer forensics : what is it? -- Computer forensics investigations : the basics -- Computer forensics investigations : a four-step process -- Electronic evidence : what is it? -- Types of evidence -- Authentication of evidence -- Standards of evidence -- 3. Laws regulating access to electronic evidence -- Telecommunications and electronic communications data -- The statutory background of privacy protection and government access to data -- 4. Searches and seizures of computers and electronic evidence -- What is privacy and why is it important? -- Constitutional source of privacy protection : the Fourth Amendment -- Search warrants -- Searching a computer for evidence -- 5. Cybercrime laws : which statute for which crime? -- Computer threats and intrusions -- Financial crimes and fraud -- Intellectual property theft and economic espionage -- Personal crimes -- 6. Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- The art of deceiving : social engineering -- Scams and scam artists -- Identity theft -- Cyberbullying -- Child exploitation online -- 7. Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Defining cyberterrorism -- Criminalizing cyberterrorism -- combating cyberterrorism -- 8. Where is the electronic evidence and which tools can we use to find it? -- The location of electronic evidence -- Tools used to search and collect electronic evidence -- 9. Crime and incident scene : what should an investigator do? -- Conducting an investigation -- Special considerations for cybercrime investigations -- Identifying evidence -- Analysis of evidence -- How to handle evidence in an investigation -- Hypothetical criminal investigation -- Extracting electronic evidence -- 10. Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- Corporate investigations -- Corporate criminal activities and policy violations -- Preparing for the investigation -- Conducting the investigation -- 11. E-mail forensics -- The importance of email investigations -- Email : the basics -- How to conduct an email investigation -- Problems encountered by computer forensics investigators -- 12. Network forensics : an introduction -- Stand-alone versus networked devices -- Computer networks -- Network components -- Where can network-related evidence be found? -- Network forensics analysis tools -- Special issues when conducting investigations in a networked environment -- Preliminary analysis -- Documentation and collection -- Analysis and preservation -- 13. Mobile devices in computer forensics investigations -- Role of mobile devices -- Mobile phones and PDAs versus other electronic devices -- which tools can be used to retrieve evidence? -- Mobile device investigations -- 14. The pretrial and courtroom experiences of a computer forensics investigator -- Pretrial procedures -- Testimony and rules of evidence -- The role of the computer forensics investigator in pretrial proceedings and court. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Electronic evidence |
| Geographic subdivision | United States. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer crimes |
| General subdivision | Investigation |
| Geographic subdivision | United States. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer crimes |
| General subdivision | Investigation. |
| Source of heading or term | fast |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Electronic evidence. |
| Source of heading or term | fast |
| 651 #7 - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | United States. |
| Source of heading or term | fast |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Library of Congress Classification |
| Koha item type | Books |
| Home library | Current library | Date acquired | Full call number | Barcode | Koha item type |
|---|---|---|---|---|---|
| African Court on Human and Peoples' Rights Library | African Court on Human and Peoples' Rights Library | 21/04/2020 | KF8947 .M37 2015 | 10208585 | Books |
