Matches in SemOpenAlex for { <https://semopenalex.org/work/W2310040676> ?p ?o ?g. }
Showing items 1 to 84 of
84
with 100 items per page.
- W2310040676 abstract "Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You’ll get expert information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, and illegally obtained evidence. It’s all here--from collecting actionable evidence, re-creating the criminal timeline, and zeroing in on a suspect to uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. Plus, you’ll get in-depth coverage of the latest PDA and cell phone investigation techniques and real-world case studies. Table of contentsPart I: Preparing for an IncidentChapter 1: The Forensics Process Chapter 2: Computer Fundamentals Chapter 3: Forensic Lab Environment PreparationPart II: Collecting the EvidenceChapter 4: Forensically Sound Evidence Collection Chapter 5: Remote Investigations and CollectionsPart III: Forensic Investigation TechniquesChapter 6: Microsoft Windows Systems Analysis Chapter 7: Linux AnalysisChapter 8: Macintosh AnalysisChapter 9: Defeating Anti-Forensic TechniquesChapter 10: Enterprise Storage AnalysisChapter 11: E-mail AnalysisChapter 12: Tracking User ActivityChapter 13: Cell Phone and PDA AnalysisPart IV: Presenting Your FindingsChapter 14: Documenting the InvestigationChapter 15: The Justice SystemPart V: AppendixesAppendix A: Forensic Forms and ChecklistsAppendix B: Understanding Legal ConcernsAppendix C: The Digital Evidence Legal ProcessAppendix D: Searching TechniquesAppendix E: The Investigator’s ToolkitGlossary" @default.
- W2310040676 created "2016-06-24" @default.
- W2310040676 creator A5055449125 @default.
- W2310040676 creator A5069378252 @default.
- W2310040676 creator A5077582831 @default.
- W2310040676 date "2004-11-22" @default.
- W2310040676 modified "2023-09-27" @default.
- W2310040676 title "Hacking Exposed Computer Forensics" @default.
- W2310040676 hasPublicationYear "2004" @default.
- W2310040676 type Work @default.
- W2310040676 sameAs 2310040676 @default.
- W2310040676 citedByCount "9" @default.
- W2310040676 countsByYear W23100406762014 @default.
- W2310040676 countsByYear W23100406762015 @default.
- W2310040676 countsByYear W23100406762016 @default.
- W2310040676 crossrefType "book" @default.
- W2310040676 hasAuthorship W2310040676A5055449125 @default.
- W2310040676 hasAuthorship W2310040676A5069378252 @default.
- W2310040676 hasAuthorship W2310040676A5077582831 @default.
- W2310040676 hasConcept C108827166 @default.
- W2310040676 hasConcept C136764020 @default.
- W2310040676 hasConcept C138885662 @default.
- W2310040676 hasConcept C166957645 @default.
- W2310040676 hasConcept C17744445 @default.
- W2310040676 hasConcept C199539241 @default.
- W2310040676 hasConcept C206345919 @default.
- W2310040676 hasConcept C2778223634 @default.
- W2310040676 hasConcept C2778707766 @default.
- W2310040676 hasConcept C2781357168 @default.
- W2310040676 hasConcept C31258907 @default.
- W2310040676 hasConcept C38652104 @default.
- W2310040676 hasConcept C41008148 @default.
- W2310040676 hasConcept C41895202 @default.
- W2310040676 hasConcept C4438859 @default.
- W2310040676 hasConcept C556601545 @default.
- W2310040676 hasConcept C84418412 @default.
- W2310040676 hasConcept C86844869 @default.
- W2310040676 hasConcept C95457728 @default.
- W2310040676 hasConceptScore W2310040676C108827166 @default.
- W2310040676 hasConceptScore W2310040676C136764020 @default.
- W2310040676 hasConceptScore W2310040676C138885662 @default.
- W2310040676 hasConceptScore W2310040676C166957645 @default.
- W2310040676 hasConceptScore W2310040676C17744445 @default.
- W2310040676 hasConceptScore W2310040676C199539241 @default.
- W2310040676 hasConceptScore W2310040676C206345919 @default.
- W2310040676 hasConceptScore W2310040676C2778223634 @default.
- W2310040676 hasConceptScore W2310040676C2778707766 @default.
- W2310040676 hasConceptScore W2310040676C2781357168 @default.
- W2310040676 hasConceptScore W2310040676C31258907 @default.
- W2310040676 hasConceptScore W2310040676C38652104 @default.
- W2310040676 hasConceptScore W2310040676C41008148 @default.
- W2310040676 hasConceptScore W2310040676C41895202 @default.
- W2310040676 hasConceptScore W2310040676C4438859 @default.
- W2310040676 hasConceptScore W2310040676C556601545 @default.
- W2310040676 hasConceptScore W2310040676C84418412 @default.
- W2310040676 hasConceptScore W2310040676C86844869 @default.
- W2310040676 hasConceptScore W2310040676C95457728 @default.
- W2310040676 hasLocation W23100406761 @default.
- W2310040676 hasOpenAccess W2310040676 @default.
- W2310040676 hasPrimaryLocation W23100406761 @default.
- W2310040676 hasRelatedWork W1492444940 @default.
- W2310040676 hasRelatedWork W155004365 @default.
- W2310040676 hasRelatedWork W187808861 @default.
- W2310040676 hasRelatedWork W1999185696 @default.
- W2310040676 hasRelatedWork W2002474196 @default.
- W2310040676 hasRelatedWork W2061171250 @default.
- W2310040676 hasRelatedWork W2140244636 @default.
- W2310040676 hasRelatedWork W2273160540 @default.
- W2310040676 hasRelatedWork W2363039419 @default.
- W2310040676 hasRelatedWork W2539905916 @default.
- W2310040676 hasRelatedWork W2567176049 @default.
- W2310040676 hasRelatedWork W2603041533 @default.
- W2310040676 hasRelatedWork W2752306575 @default.
- W2310040676 hasRelatedWork W2900312859 @default.
- W2310040676 hasRelatedWork W2972694196 @default.
- W2310040676 hasRelatedWork W2992792080 @default.
- W2310040676 hasRelatedWork W3168753101 @default.
- W2310040676 hasRelatedWork W577684401 @default.
- W2310040676 hasRelatedWork W641418317 @default.
- W2310040676 hasRelatedWork W607155924 @default.
- W2310040676 isParatext "false" @default.
- W2310040676 isRetracted "false" @default.
- W2310040676 magId "2310040676" @default.
- W2310040676 workType "book" @default.