Computer forensics : cybercriminals, laws, and evidence / Marie-Helen Maras, PhD, Associate Professor, John Jay College of Criminal Justice.
Material type:
TextLanguage: English Publication details: Burlington, MA : Jones & Bartlett Learning, 2015Edition: Second editionDescription: xv, 408 p. : ill. ; 23 cmISBN: 9781449692223 (pbk.); 1449692222 (pbk.)Subject(s): Electronic evidence -- United States | Computer crimes -- Investigation -- United StatesLOC classification: KF8947.5 | .M37 2015| Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
|---|---|---|---|---|---|---|---|
| Book | Fujairah University | Main Library | KF8947.5 .M37 2015 (Browse shelf (Opens below)) | C.1 | Available | 000685 |
Browsing Fujairah University shelves, Collection: Main Library Close shelf browser (Hides shelf browser)
|
|
|
|
No cover image available |
|
|
||
| KF3408 .C37 2010 Labor relations and collective bargaining : cases, practice, and law / | KF6272 .J66 2006 Principles of taxation for business and investment planning / | KF6369 .I525 1999 Income tax fundamentals / | KF8947.5 .M37 2015 Computer forensics : cybercriminals, laws, and evidence / | KMC554 .M87 1990z موسوعة الجمارك و الاستيراد و التصدير في مصر والدول العربية / | KMC893 .J87 2016 الملامح التشريعية للصحافة في الوطن العربي / | KMC893 .J87 2016 الملامح التشريعية للصحافة في الوطن العربي / |
Includes bibliographical references and index.
Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile devices in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator.

There are no comments on this title.