×







We sell 100% Genuine & New Books only!

Computer Forensics Evidence Collection And Management (Hb) at Meripustak

Computer Forensics Evidence Collection And Management (Hb) by Newman, Routledge Taylor and Francis group

Books from same Author: Newman

Books from same Publisher: Routledge Taylor and Francis group

Related Category: Author List / Publisher List


  • Price: ₹ 9908.00/- [ 22.00% off ]

    Seller Price: ₹ 7728.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Newman
    PublisherRoutledge Taylor and Francis group
    ISBN9780849305610
    Pages404
    BindingHard Back
    LanguageEnglish
    Publish YearJanuary 2012

    Description

    Routledge Taylor and Francis group Computer Forensics Evidence Collection And Management (Hb) by Newman

    Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on? investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.



    Book Successfully Added To Your Cart