Computer forensics and cyber crime : an introduction / Marjie T. Britz.
Material type:
TextPublication details: Upper Saddle River, New Jersey : Pearson/Prentice Hall, c2004.Description: xv, 248 pages : illustrations ; 24 cmISBN: - 053655370X
- 9780536553706
- CIR QA 76.9.A25 B75 2004
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR QA 76.9.A25 B75 2004 (Browse shelf(Opens below)) | c.1 | Available | R0010225 | |||||||||||
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR QA 76.9.A25 B75 2004 (Browse shelf(Opens below)) | c.2 | Available | R0010226 | |||||||||||
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR QA 76.9.A25 B75 2004 (Browse shelf(Opens below)) | c.3 | Available | R0010227 | |||||||||||
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR QA 76.9.A25 B75 2004 (Browse shelf(Opens below)) | c.4 | Available | R0010228 | |||||||||||
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR QA 76.9.A25 B75 2004 (Browse shelf(Opens below)) | c.5 | Available | R0010229 |
Browsing Cavite State University - CCAT Campus shelves,Shelving location: GCS,Collection: Book Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
|
||
| CIR QA 76.9.A25 B75 2004 Computer forensics and cyber crime : an introduction / | CIR QA 76.9.A25 B75 2004 Computer forensics and cyber crime : an introduction / | CIR QA 76.9.A25 B75 2004 Computer forensics and cyber crime : an introduction / | CIR QA 76.9.A25 B75 2004 Computer forensics and cyber crime : an introduction / | CIR QA 76.9.A73 C65 2022 Modern computer architecture / | CIR QA 76.9.A73 H39 1988 Computer architecture and organization / | CIR QA 76.9.A73 M37 2010 Computer system architecture / |
Includes bibliographical references (p. 235-241) and index
1. Introduction
2. Computer Terminology and History
3. History of Crime and Computer Crime
4.Computer Crimes: Computers as Targets-Hacking and Beyond
5. Avenues for Prosecution and Government Efforts
6. Applying the First Amendment
7. The Fourth Amendment
8. Forensic Terminology and Computer Investigations
9. Developing Computer Forensic Science and Capabilities
10. Computer Investigations: Pre-Search activities
11. On-Scene Activities
12. Data Analysis
13. Conclusions and Future Issues
This text is an excellent first step for anyone who wishes to learn about the investigation of computer crime, and the forensic processing of seized computer data. It is also an excellent reference for major cases involving computer prosecutions.
In English text.
There are no comments on this title.
