In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. "Forensic Computing: A Practitioner's Guide" is illustrated by plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding of:
- how to recover information from computer systems in such a way as to ensure that its integrity cannot be challenged and that it will be accepted as admissible evidence in court the principles involved in password protection and data encryption
- the evaluation procedures used in circumventing these safeguards
- the particular legal issues associated with computer-generated evidence and how to ensure admissibility of such evidence.
This edition is fully expanded and updated with treatment of metadata files, NFTS systems, CHS and LBA addressing, and alternate data streams.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Until 1984, Professor A. J. Sammes was a serving British Army Officer with the rank of Colonel, late of the Royal Corps of Signals. His present appointment is Professor of Computing Science, in the Faculty of Military Science, Technology and Management at the Defense Academy, Cranfield University, Shrivenham.
His formal qualifications include a Bachelor of Science in Electrical Engineering, a Master of Philosophy in Computer Science and a Doctor of Philosophy in Computer Science, all degrees having been awarded by the University of London. He is also a Fellow of the British Computer Society and a Chartered Engineer.
His department has been more or less solely responsible for training senior police officers in the UK in the art of forensic computing. His testimony as an expert witness has been called in countless cases, of some of great national importance.
Forensic computing is becoming of primary importance as computers increasingly figure as sources of evidence in all sorts of criminal investigations. However, in order for such evidence to be legally useful, it is vital that it be collected and processed according to rigorous principles.
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered when it has been hidden or subverted by criminals, and give the reader the means to insure that it is accepted as admissible evidence in court. Updated to fall in line with ACPO 2003 guidelines, "Forensic Computing: A Practitioner's Guide" is illustrated with plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding in:
* The principles involved in password protection and data encryption
* The evaluation procedures used in circumventing a system’s internal security safeguards
* Full search and seizure protocols for experts and police officers.
The new volume not only discusses the new file system technologies brought in by Windows XP and 2000 but now also considers modern fast drives, new encryption technologies, the practicalities of "live" analysis, and the problems inherent in examining personal organisers.
Tony Sammes is Professor of Forensic Computing at Cranfield University and the Director of the Centre for Forensic Computing based at the Defence Academy in Shrivenham. His department has been more or less solely responsible for training and educating senior law enforcement officers in the UK in the art of forensic computing. His testimony as an expert witness has been called in a variety of cases, some of national importance.
Brian Jenkinson is a retired Detective Inspector, formally Head of the Cambridgeshire Constabulary Fraud Squad. He is now an independent Forensic Computer Consultant and is alsoclosely involved in teaching to both law enforcement and commercial practitioners. He was appointed Visiting Professor for Forensic Computing in 2002 at Cranfield University and the Defence Academy.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G1846283973I4N00
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Hardback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Artikel-Nr. GOR004321528
Anzahl: 3 verfügbar
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
Zustand: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Ex library copy with usual stamps & stickers. Artikel-Nr. wbs9423515523
Anzahl: 1 verfügbar
Anbieter: True Oak Books, Highland, NY, USA
Hardcover. Zustand: Very Good. - Great overall condition. Minor cosmetic wear. No noteworthy blemishes. No writing.; - We offer free returns for any reason and respond promptly to all inquiries. Your order will be packaged with care and ship on the same or next business day. Buy with confidence. Artikel-Nr. HVD-25929-A-0
Anzahl: 1 verfügbar
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
Zustand: Fair. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In fair condition, suitable as a study copy. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,900grams, ISBN:9781846283970. Artikel-Nr. 8604582
Anzahl: 1 verfügbar
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
Zustand: Poor. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In poor condition, suitable as a reading copy. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,850grams, ISBN:9781846283970. Artikel-Nr. 9375005
Anzahl: 1 verfügbar
Anbieter: medimops, Berlin, Deutschland
Zustand: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Artikel-Nr. M01846283973-V
Anzahl: 1 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9781846283970_new
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - 2. Ed, ungelesenes Mängelexemplar, gestempelt, mit leichten Lagerspuren - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers. Artikel-Nr. INF1000567449
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - leichte Beschädigungen oder Verschmutzungen, ungelesenes Mängelexemplar, gestempelt - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers. Artikel-Nr. INF1000547070
Anzahl: 1 verfügbar