In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system’s internal security safeguards, and full search and seizure protocols for experts and police officers. The book discusses file system technologies encountered in such operating platforms as Windows XP and 2000, and considers modern fast drives, new encryption technologies, the practicalities of "live" analysis, and the problems inherent in examining personal organisers. Numerous case studies and worked examples illustrate the text.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Until 1984, Professor A. J. Sammes was a serving British Army Officer with the rank of Colonel, late of the Royal Corps of Signals. His present appointment is Professor of Computing Science, in the Faculty of Military Science, Technology and Management at the Defense Academy, Cranfield University, Shrivenham.
His formal qualifications include a Bachelor of Science in Electrical Engineering, a Master of Philosophy in Computer Science and a Doctor of Philosophy in Computer Science, all degrees having been awarded by the University of London. He is also a Fellow of the British Computer Society and a Chartered Engineer.
His department has been more or less solely responsible for training senior police officers in the UK in the art of forensic computing. His testimony as an expert witness has been called in countless cases, of some of great national importance.
Forensic computing is becoming of primary importance as computers increasingly figure as sources of evidence in all sorts of criminal investigations. However, in order for such evidence to be legally useful, it is vital that it be collected and processed according to rigorous principles.
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered when it has been hidden or subverted by criminals, and give the reader the means to insure that it is accepted as admissible evidence in court. Updated to fall in line with ACPO 2003 guidelines, "Forensic Computing: A Practitioner's Guide" is illustrated with plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding in:
* The principles involved in password protection and data encryption
* The evaluation procedures used in circumventing a systems internal security safeguards
* Full search and seizure protocols for experts and police officers.
The new volume not only discusses the new file system technologies brought in by Windows XP and 2000 but now also considers modern fast drives, new encryption technologies, the practicalities of "live" analysis, and the problems inherent in examining personal organisers.
Tony Sammes is Professor of Forensic Computing at Cranfield University and the Director of the Centre for Forensic Computing based at the Defence Academy in Shrivenham. His department has been more or less solely responsible for training and educating senior law enforcement officers in the UK in the art of forensic computing. His testimony as an expert witness has been called in a variety of cases, some of national importance.
Brian Jenkinson is a retired Detective Inspector, formally Head of the Cambridgeshire Constabulary Fraud Squad. He is now an independent Forensic Computer Consultant and is also closely involved in teaching to both law enforcement and commercial practitioners. He was appointed Visiting Professor for Forensic Computing in 2002 at Cranfield University and the Defence Academy.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 4,53 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
Condizione: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Codice articolo Z1-C-084-03951
Quantità: 1 disponibili
Da: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Germania
Softcover reprint of hardcover 2nd ed. 2007. 16 x 24 cm. X, 470 S. X, 470 p. 196 illus. Softcover Sprache: Englisch. Codice articolo 710VB
Quantità: 3 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Authors are the primary educators of senior police investigators in the UK in this fieldProfessor Sammes has testified in countless criminal cases from fraud to issues of national security he is internationally respected and has liaised with poli. Codice articolo 4288717
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781849965965_new
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers. 476 pp. Englisch. Codice articolo 9781849965965
Quantità: 2 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. 'Forensic Computing: A Practitioner's Guide' is illustrated by plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding of: how to recover information from computer systems in such a way as to ensure that its integrity cannot be challenged and that it will be accepted as admissible evidence in court the principles involved in password protection and data encryption the evaluation procedures used in circumventing these safeguards the particular legal issues associated with computer-generated evidence and how to ensure admissibility of such evidence.This edition is fully expanded and updated with treatment of metadata files, NFTS systems, CHS and LBA addressing, and alternate data streams.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 476 pp. Englisch. Codice articolo 9781849965965
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. 'Forensic Computing: A Practitioner's Guide' is illustrated by plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding of: - how to recover information from computer systems in such a way as to ensure that its integrity cannot be challenged and that it will be accepted as admissible evidence in court the principles involved in password protection and data encryption- the evaluation procedures used in circumventing these safeguards- the particular legal issues associated with computer-generated evidence and how to ensure admissibility of such evidence.This edition is fully expanded and updated with treatment of metadata files, NFTS systems, CHS and LBA addressing, and alternate data streams. Codice articolo 9781849965965
Quantità: 1 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 747. Codice articolo C9781849965965
Quantità: Più di 20 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 476 2nd Edition. Codice articolo 263101585
Quantità: 4 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. PRINT ON DEMAND pp. 476. Codice articolo 183101595
Quantità: 4 disponibili