Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers
Would your company be prepared in the event of:
* Computer-driven espionage
* A devastating virus attack
* A hacker's unauthorized access
* A breach of data security?
As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks.
The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs.
Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.
Basics of Computer Forensic Concepts
Preservation and Collection of Digital Evidence
Analysis of Digital Evidence
Reporting and Rendering the Opinion
Other editions - View all
admissibility analysis attack beneﬁts best evidence rule binary BIOS chapter child pornography collection computer crime computer forensic computer forensic experts computer forensic investigators computer forensic technicians computer investigators computer program computer system computer technology computer’s conﬁguration copy court credit card criminal Daubert deﬁnition deleted ﬁles depending device difﬁcult digital evidence discussed disk document e-mail efﬁcient employee encryption ensure example fact ﬁeld ﬁle ﬁle slack ﬁnal ﬁnd ﬁngerprints ﬁrst ﬂoppy ﬂow forensic examination fraud hacking hard drive hardware hash value hexadecimal Ibid identity theft imaging inﬂuence installed Internet laptop law enforcement library ﬁle malware ofﬁce ofﬁcers online auction operating system password password cracking problem puter Regardless requires rootkit rules scientiﬁc seizure speciﬁc spyware steganography storage stored suspect system administrator target testimony things today’s Trojan horse understand war dialing wireless network witnesses