000 03598cam a2200541Mc 4500
001 on1194522327
003 OCoLC
005 20240617071554.0
006 m o d
007 cr |||||||||||
008 200331s2010 nju ob 001 u eng d
020 _a9781607617723
020 _a1607617722
020 _a9781607617716
020 _a9781617797033
020 _a1607617730
024 7 _a10.1007/978-1-60761-772-3
_2doi
029 1 _aNLGGC
_b343175649
035 _a(OCoLC)1194522327
_z(OCoLC)707457281
040 _aBEATB
_bdut
_epn
_cBEATB
_dNLGGC
_dOCLCF
_dOCLCQ
_dOCLCO
_dOCLCL
050 4 _aHV8079.C65
_bC93 2010
082 0 4 _a363.25968
_222
084 _a54.62
_2bcl
084 _a86.42
_2bcl
245 0 0 _aCyberForensics
_bUnderstanding Information Security Investigations
260 _aTotowa, NJ
_bHumana Press :
_bImprint: Humana
_c2010
300 _a1 online resource
490 0 _aSpringers forensic laboratory science series
504 _aIncludes bibliographical references and index.
520 3 _aThis fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years' experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.
650 0 _aComputer crimes
_vCase studies
_xInvestigation.
650 4 _aLegal medicine
650 4 _aApplied marketing
650 4 _aComputer science
650 4 _aInformation systems
650 4 _agerechtelijk onderzoek
650 4 _ae-business
650 4 _acomputers
650 4 _agerechtelijke geneeskunde
650 4 _ae-commerce
650 4 _acomputerkunde
650 7 _aComputer crimes.
_2fast
_0(OCoLC)fst00872063
700 1 _aBayuk, Jennifer
758 _aCyberForensics (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFv9hC6PP93FYTxCTbgGDy
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 _tCyberForensics
_w(NL-LeOCL)328487783
942 _2ddc
_cBK
_n0
948 _hNO HOLDINGS IN GHUCC - 5 OTHER HOLDINGS
999 _c2271
_d2271