Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes by Albert J Marcella and Doug Menendez.
Material type: TextLanguage: Publication details: New York : Auerbach, 2008.Edition: 2nd edDescription: xxviii, 498ISBN:- 9780849383281
- 363.25968 MAR/CYB
Item type | Current library | Home library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
Reference | NLUO | NLUO | Reference | 363.25968 MAR/CYB (Browse shelf(Opens below)) | Available | 12302 | |||
Book | NLUO | NLUO | 363.25968 MAR/CYB (Browse shelf(Opens below)) | Available | 12303 | ||||
Book | NLUO | NLUO | 363.25968 MAR/CYB (Browse shelf(Opens below)) | Available | 12304 | ||||
Book | NLUO | NLUO | 363.25968 MAR/CYB (Browse shelf(Opens below)) | Available | 12305 |
Browsing NLUO shelves Close shelf browser (Hides shelf browser)
363.259323 SAM/MEA Measuring corruption | 363.25968 Cyber crime investigations : | 363.25968 MAR/CYB Cyber forensics : | 363.25968 MAR/CYB Cyber forensics : | 363.25968 MAR/CYB Cyber forensics : | 363.25968 MAR/CYB Cyber forensics : | 363.2850941 Blackstone's handbook of ports and border security |
Table of Contents:
Chapter 1. Introduction
Chapter 2. Cyber forensic tools and utilities
Chapter 3. Concealment techniques
Chapter 4. Hardware : model system platforms
Chapter 5. Software : operating systems, network traffic, and applications
Chapter 6. Standard operating procedures : digital forensic laboratory accreditation standards
Chapter 7. Performing a cyber forensic investigation : flowchart for the seizure of electronic evidence and associated internal control questionnaire
Chapter 8. Privacy and cyber forensics : an Australian perspective
Chapter 9. Forensic black bag
Chapter 10. Digital multifunctional devices : forensic value and corporate exposure
Chapter 11. Cyber forensics and the law : legal considerations
Chapter 12. Cyber forensics and the changing face of investigating criminal behavior
Chapter 13. Electronically stored information and cyber forensics
Chapter 14. Cyber forensic awareness : management survey