Search:

Forensic Computing. A Practioners Guide

Format Post in Legal & Law BY Brian Jenkinson, J. Sammes

1852332999 Shared By Guest

Forensic Computing. A Practioners Guide Brian Jenkinson, J. Sammes is available to download <table><tr><td colspan="2"><strong style="font-size:1.This material is available do download at niSearch.com on Brian Jenkinson, J. Sammes's eBooks, 2em;">Forensic Computing.Forensic Computing. A Practioners ... Textbook A Practioners Guide</strong><br/>Brian Jenkinson, J. Sammes</td></tr> <tr> <td><b>Type:</b></td> <td>eBook</td> </tr> <tr> <td><b>Released:</b></td> <td>2000</td> </tr> <tr> <td><b>Publisher:</b></td> <td>Springer</td> </tr> <tr> <td><b>Page Count:</b></td> <td>464</td> </tr> <tr> <td><b>Format:</b></td> <td>pdf</td> </tr> <tr> <td><b>Language:</b></td> <td>English</td> </tr> <tr> <td><b>ISBN-10:</b></td> <td>1852332999</td> </tr> <tr> <td><b>ISBN-13:</b></td> <td>9781852332990</td> </tr> </table> In this book, Tony Sammes and Brian Jenkinson (both acknowledged authorities in this field), show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. Forensic Computing: A Practitioner's Guide is illustrated by plenty of case studies and worked examples, and will help practitioners and students gain a clear understanding of:- - how to recover information from computer systems in such a way as to ensure that its integrity cannot be challenged and that it will be accepted as admissible evidence in court - the principles involved in password protection and data encryption - the evaluation procedures used in circumventing these safeguards - the particular legal issues associated with computer-generated evidence and how to ensure admissibility of such evidence.

Comments (0)

Currently,no comments for this book!