Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
EUR 2,60
Anzahl: 3 verfügbar
In den WarenkorbHardback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Hardcover. Zustand: Very Good. - Great overall condition. Minor cosmetic wear. No noteworthy blemishes. No writing.; - We offer free returns for any reason and respond promptly to all inquiries. Your order will be packaged with care and ship on the same or next business day. Buy with confidence.
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
EUR 3,08
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Ex library copy with usual stamps & stickers.
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
EUR 3,87
Anzahl: 1 verfügbar
In den WarenkorbZustand: Fair. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In fair condition, suitable as a study copy. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,900grams, ISBN:9781846283970.
Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland
Softcover reprint of hardcover 2nd ed. 2007. 16 x 24 cm. X, 470 S. X, 470 p. 196 illus. Softcover Sprache: Englisch.
EUR 78,14
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,40
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Taschenbuch. Zustand: Neu. Forensic Computing | Anthony Sammes (u. a.) | Taschenbuch | x | Englisch | 2010 | Springer | EAN 9781849965965 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - 2. Ed, ungelesenes Mängelexemplar, gestempelt, mit leichten Lagerspuren - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - 2.Ed, ungelesenes Mängelexemplar, gestempelt, mit leichten Lagerspuren - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - 2.Ed, ungelesenes Mängelexemplar, gestempelt, mit leichten Lagerspuren - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - leichte Beschädigungen oder Verschmutzungen, ungelesenes Mängelexemplar, gestempelt - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - leichte Beschädigungen oder Verschmutzungen, ungelesenes Mängelexemplar, gestempelt - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Gebundene Ausgabe. Zustand: Sehr gut. Gebraucht - Sehr gut SG - leichte Beschädigungen oder Verschmutzungen, ungelesenes Mängelexemplar, gestempelt - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2007
ISBN 10: 1846283973 ISBN 13: 9781846283970
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 154,13
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 2nd edition. 465 pages. 9.25x6.25x1.00 inches. In Stock.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. 'Forensic Computing: A Practitioner's Guide' is illustrated by plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding of: - how to recover information from computer systems in such a way as to ensure that its integrity cannot be challenged and that it will be accepted as admissible evidence in court the principles involved in password protection and data encryption- the evaluation procedures used in circumventing these safeguards- the particular legal issues associated with computer-generated evidence and how to ensure admissibility of such evidence.This edition is fully expanded and updated with treatment of metadata files, NFTS systems, CHS and LBA addressing, and alternate data streams.