- Computer–driven espionage
- A devastating virus attack
- A hacker′s unauthorized access
- A breach of data security?
As the sophistication of computer technology has grown, so has the rate of computer–related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks.
The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs.
Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt and devastate a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.
1 A Definition of Computer Forensics.
History of Computer Forensics.
World Wide Web.
2 Basics of Computer Forensic Concepts.
Understanding Digital Evidence.
What Computer Data Is.
3 Preservation and Collection of Digital Evidence.
Rules of Evidence.
4 Analysis of Digital Evidence.
5 Reporting and Rendering the Opinion.
Preparing the Report.
6 Computer Attacks.
Hackers and Phreakz Oh My.
Hackers: Unauthorized Use and Trespassing.
Attacks from the Inside.
7 Computers as Tools for Evil.
Computers and Crime.
Auction Fraud and Retail Cons.
Counterfeiting and Forgery.
8 Computer Tools and the Forensic Examination.
Assuming Control of the Case.
Understanding the Case.
Evaluating the Evidence.
Examining the "Live" System.
Collecting Data from a Dead System.
Imaging the Drive.
9 Presenting Digital Evidence in Court.
Types of Evidence.
Legal Requirements of Evidence.
Search and Seizure.
"In conclusion, Mr. Sheetz′s new book is comprehensible, accessible and a valuable contribution to this increasingly important area of our jurisprudence and justice system." (New York Law Journal, May 29, 2007)
"This book is a well–written, useful resource on the topic of computer forensics, enhancing the reader′s understanding of computer crime, how it occurs, and what to do about it." (Legal Information–Alert; 5/2007)
"Solid advice for those without a strong technical background who want to be aware of the threats lurking out there in cyberworld." (PQ Magazine, November 2007)