It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:241033077:4169
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:241033077:4169?format=raw

LEADER: 04169cam 2200337Ia 4500
001 9922265600001661
005 20150423143028.0
008 070804s2007 maua 001 0 eng d
020 $a9781597492232
020 $a159749223X
035 $a(CSdNU)u319069-01national_inst
035 $a(OCoLC)166379655
035 $a(OCoLC)166379655
035 $a(OCoLC)166379655
040 $aBTCTA$cBTCTA$dYDXCP$dBAKER$dBWX$dGUA$dOrLoB-B
049 $aCNUM
090 $aHV8079.C65$bW556 2007
245 00 $aTechno security's guide to e-discovery and digital forensics /$cJack Wiles ... [et al.].
246 1 $iSubtitle from cover:$aa comprehensive handbook for investigators, examiners, IT security managers, lawyers, and academia
260 $aBurlington, Mass. :$bSyngress Publishing,$cc2007.
300 $axxvi, 405 p. :$bill. ;$c24 cm.
500 $a"The Training Co."
500 $a"Free e-book download"--Cover.
500 $aIncludes index.
505 0 $aCh. 1. Authentication: Are You Investigating the Right Person? -- Authentication: What Is It? -- An Authentication War Story from 20 Years Ago: The Outside Job -- A Second Authentication War Story -- Let's Do Something about This Authentication Problem -- A Third Authentication War Story -- Security Threats in the Future -- The Inside Job -- A Final Authentication War Story -- Key Loggers 101 -- Some 21st Century Solutions to Authentication -- Security Awareness Training -- The Rest of the Book -- Ch. 2. Digital Forensics: An Overview -- Digital Forensic Principles -- Digital Environments -- Digital Forensic Methodologies -- Ch. 3. Working with Other Agencies -- Building the Relationship -- Building Your Package of Information -- Don't Shop Your Cases -- A Discussion of Agencies -- The Big Two: The U.S. Secret Service and the FBI -- Other Federal Cyber Crime Investigations Agencies -- Ch. 4. Developing an Enterprise Digital Investigative/Electronic Discovery Capability -- Identifying Requirements for an Enterprise Digital Investigative/Electronic Discovery Capability -- Administrative Considerations for an Enterprise Digital Investigative/Electronic Discovery Capability -- Identifying Resources (Software/Hardware/Facility) for Your Team -- Ch. 5. Forensic Examination in a Terabyte World -- Volume Challenges -- Network and Hardware Challenges -- Future Digital Forensic Solutions -- The FTK 2.x Model -- Ch. 6. Selecting Equipment for a Computer Forensic Laboratory -- Forensic Workstations for the Laboratory -- Forensic Workstations for the Mobile or Field Laboratory -- Hardware Write-Protection Devices -- Data Storage -- Miscellaneous Items -- Ch. 7. Integrating a Quality Management System in a Digital Forensic Laboratory -- Quality Planning, Quality Reviews, and Continuous Quality Improvement -- Other Challenges: Ownership, Responsibility, and Authority -- Ch. 8. Balancing E-discovery Challenges with Legal and IT Requirements -- Drivers of E-discovery Engineering -- Locations, Forms, and Preservation of Electronically Stored Information -- Legal and IT Team Considerations for Electronic Discovery -- Are You Litigation Ready? -- E-discovery Tools -- Ch. 9. E-mail Forensics -- Where to Start -- Forensic Acquisition -- Processing Local Mail Archives -- Ch. 10. Murder and Money: The Story of Standards, Accreditation, and Certification in Computer Forensics -- Standards -- Accreditation -- Certification -- Rough Beginnings -- Money to the Rescue -- Standards and Computer Forensics -- Certification Options for the Digital Evidence Analyst -- Another Standards Option -- Ch. 11. Starting a Career in the Field of Techno Forensics -- Occupations -- Professional Organizations -- Professional Certifications -- Degree Programs -- App. A. Death by a Thousand Cuts -- App. B. Credibility is Believability - Success in the Courtroom -- First Impressions -- Appearance -- Body Language -- Speech.
650 0 $aComputer crimes$xInvestigation.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security.
700 1 $aWiles, Jack.
994 $aC0$bCNU
999 $aHV 8079 .C65 W556 2007$wLC$c1$i31786102234447$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u1/29/2008