Computer Forensics Evidence Collection and Management (HB) at Meripustak

Computer Forensics Evidence Collection and Management (HB)

Books from same Author: Newman

Books from same Publisher: Routledge Taylor and Francis group

Related Category: Author List / Publisher List


  • Price: ₹ 7169.00/- [ 24.00% off ]

    Seller Price: ₹ 5449.00

Sold By: Store4Doctors      Click for Bulk Order

Offer 1: Get 24.00 % + Flat ₹ 75 discount on shopping of ₹ 500 [Use Code: MPSTK75]

Offer 2: Get 24.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 24.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Newman
    PublisherRoutledge Taylor and Francis group
    ISBN9780849305610
    Pages404
    BindingHard Back
    LanguageEnglish
    Publish YearJanuary 2012

    Description

    Routledge Taylor and Francis group Computer Forensics Evidence Collection and Management (HB) by Newman

    Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on? investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.