Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Computer Forensics: Computer Crime Scene Investigation by Vacca, John R.
by Vacca, John R. | PB | Good
US $17.61
Approximately£12.97
Condition:
“Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ”... Read moreAbout condition
Good
A book that has been read, but is in good condition. Minimal damage to the book cover eg. scuff marks, but no holes or tears. If this is a hard cover, the dust jacket may be missing. Binding has minimal wear. The majority of pages are undamaged with some creasing or tearing, and pencil underlining of text, but this is minimal. No highlighting of text, no writing in the margins, and no missing pages. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Free Economy Shipping.
Estimated between Sat, 26 Jul and Thu, 31 Jul to 94104
Located in: Aurora, Illinois, United States
Returns:
30 days return. Seller pays for return postage.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:375614438278
Item specifics
- Condition
- Good
- Seller notes
- Binding
- Paperback
- Book Title
- Computer Forensics
- Weight
- 3 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9781584503897
About this product
Product Identifiers
Publisher
Charles River Apparel Media
ISBN-10
1584503890
ISBN-13
9781584503897
eBay Product ID (ePID)
30877770
Product Key Features
Number of Pages
864 Pages
Language
English
Publication Name
Computer Forensics : Computer Crime Scene Investigation
Subject
General, Security / Networking, Electrical, Computer Engineering
Publication Year
2005
Type
Textbook
Subject Area
Computers, Technology & Engineering
Format
Trade Paperback
Dimensions
Item Height
1.9 in
Item Weight
49.7 Oz
Item Length
9 in
Item Width
7.3 in
Additional Product Features
Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
2005-007521
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction Part I Overview of Computer Forensics Technology Chapter 1 Computer Forensics Fundamentals Chapter 2 Types of Computer Forensics Technology Chapter 3 Types of Computer Forensics Systems Chapter 4 Vendor and Computer Forensics Services Part II Computer Forensics Evidence and Capture Chapter 5 Data Recovery Chapter 6 Evidence Collection and Data Seizure Chapter 7 Duplication and Preservation of Digital Evidence Chapter 8 Computer Image Verification and Authentication Part III Computer Forensics Analysis Chapter 9 Discovery of Electronic Evidence Chapter 10 Identification of Data Chapter 11 Reconstructing Past Events Chapter 12 Networks Part IV Countermeasures: Information Warfare Chapter 13 Fighting Against Macro Threats: Defensive Strategies Chapter 14 The Information Warfare Arsenal and Tactics of the Military Chapter 15 The Information Warfare Arsenal and Tactics of Terrorists and Rogues Chapter 16 The Information Warfare Arsenal and Tactics of Private Companies Chapter 17 The Information Warfare Arsenal of the Future Chapter 18 Surveillance Tools for Information Warfare of the Future Chapter 19 Civilian Casualties: The Victims and Refugees of Information Warfare Part V Advanced Computer Forensics Systems and Future Directions Chapter 20 Advanced Computer Forensics Chapter 21 Summary, Conclusions, and Recommendations Appendix A Frequently Asked Questions Appendix B Computer Forensics Resources Appendix C Links to Computer Forensics and Related Law Enforcement Web Pages Appendix D More Computer Forensics Cases Appendix E Answers to Review Questions and Exercises, Hands-on Projects, Case Projects, and Optional Team Case Projects by Chapter Appendix F Checklists by Chapter Appendix G About the CD-ROM Appendix H Glossary of Terms and Acronyms Index
Synopsis
Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to ?crime scene investigation,? seizure of data, determining the ?fingerprints? of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world., Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world., This comprehensive reference provides all the information and software one needs to track down computer criminals. Numerous exercises, case studies, and vignettes of actual criminal methods enhance the topics under discussion, providing solutions to computer crime in the real world. The book's companion CD-ROM contains demos of the latest computer forensics software.
LC Classification Number
HV8079.C65
Item description from the seller
Seller business information
About this seller
ThriftBooks
98.9% positive Feedback•19.7M items sold
Registered as a business seller
Popular categories from this shop
Seller Feedback (5,686,742)
- c***m (410)- Feedback left by buyer.Past 6 monthsVerified purchaseWOW!; I cannot believe this 3 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 05/05, Mon, Received 05/08, Thu to Hawaii using free shipping; USPS Ground Mail, Book in Excellent Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!
- a***r (375)- Feedback left by buyer.Past monthVerified purchasei am so happy to have every book of this series! the price of the book & the shipping is very reasonable! the book was as described & was in excellent condition! it was shipped quickly & arrived quickly! the books are always packaged carefully so they arrived undamaged! the communication from the sellers is always excellent--they go out of their way for excellent customer service! i have been a repeat customer from this seller & always will be! this seller is the best bookseller on ebay!
- l***b (331)- Feedback left by buyer.Past monthVerified purchase5 STARS on ALL aspects... ITEM AS DESCRIBED - 5 STARS... PACKAGING & SHIPPING - 5 STARS... VALUE OF ITEM RECEIVED - 5 STARS... COMMUNICATION - 5 STARS. Would highly recommend this seller to all Ebay buyers without any reservations. Thanks again for your business with BB812, and we do appreciate your care and consideration of our offer. HAPPY EBAY LIFE !!!
More to explore:
- Forensics Books,
- Computer & IT Computer Active Magazines,
- Crime & Thriller Books John Grisham,
- Computer & IT September Computer Active Magazines,
- Computer & IT Computer Active Magazines in English,
- John Creasey English Crime & Thriller Books,
- Computer & IT Magazines,
- Computer Music Magazines,
- Computer & IT Edge Magazines,
- Computer & IT Monthly Magazines