Digital forensics for legal professionals : (Record no. 6457)

MARC details
000 -LEADER
fixed length control field 06972nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240112071850.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210925b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496438 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 347.7364
Edition number 23
Item number DAN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Daniel, Larry E.
245 10 - TITLE STATEMENT
Title Digital forensics for legal professionals :
Remainder of title understanding digital evidence from the warrant to the courtroom /
Statement of responsibility, etc. Larry Daniel, and Lars Daniel.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Waltham, MA :
Name of publisher, distributor, etc. Syngress/Elsevier,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxxi, 330 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note CONTENTS<br/><br/>CHAPTER 1: DIGITAL EVIDENCE IS EVERYWHERE<br/>Introduction<br/>what is digital forensics<br/>what is digital evidence<br/>how digital evidence is created and stored<br/>summary<br/><br/>CHAPTER 2: OVERVIEW OF DIGITAL FORENSICS<br/>introduction<br/>digital forensics<br/>a little computer history<br/>a brief history of computer forensics<br/>computer forensics becomes digital forensics<br/>summary<br/><br/>CHAPTER 3: DIGITAL FORENSICS: THE SUBDISCIPLINES<br/>introduction<br/>the subdisciplines<br/>computer forensics<br/>summary<br/><br/>CHAPTER 4: THE FOUNDATIONS OF DIGITAL FORENSICS: BEST PRACTICES<br/>Introduction<br/>Who establishes best practices<br/>who should be following best practices<br/>e.tc<br/><br/>CHAPTER 5: DIGITAL FORENSICS AT WORK IN THE LEGAL SYSTEM<br/>Introduction<br/>what makes a tool forensically sound<br/>who performs tool testing<br/>computer forensics tools: an overview<br/>e.tc<br/><br/>CHAPTER 6: DIGITAL FORENSICS AT WORK IN THE LEGAL SYSTEM<br/>Introduction<br/>mitigation<br/>pre-trial motions<br/>trial preparation<br/>e.tc<br/><br/>CHAPTER 7: WHY DO I NEED AN EXPERT<br/>Introduction<br/>why hire a digital forensics expert<br/>when to hire a digital Forensics expert<br/>e.tc<br/><br/>CHAPTER 8: THE DIFFERENCE BETWEEN COMPUTER EXPERTS AND DIGITAL FORENSICS EXPERTS<br/>Introduction<br/>the computer expert<br/>The digital forensics expert<br/>A side by side comparison<br/>e.tc<br/><br/>CHAPTER 9: SELECTING A DIGITAL FORENSICS EXPERT<br/>Introduction<br/>what is an expert<br/>locating and selecting an expert<br/>certifications<br/>e.tc<br/><br/>CHAPTER 10: WHAT TO EXPECT FROM AN EXPERT<br/>Introduction<br/>general expectations<br/>where to begin<br/>the examination<br/>court preparation<br/><br/>CHAPTER 11: APPROCHES BY DIFFERENT TYPES OF EXAMINERS<br/>Introduction<br/>Standards<br/>Training and experience<br/>impact on examinations<br/>e.tc<br/><br/>CHAPTER 12: SPOTTING A PROBLEM EXPERT<br/>Introduction<br/>beyond the window dressings<br/>e.tc<br/><br/>CHAPTER 13: QUALIFYING AN EXPERT IN COURT<br/>Introduction<br/>Qualifying an expert<br/>Qualifying experts in court<br/>e.tc<br/><br/>CHAPTER 14: OVERVIEW OF DIGITAL EVIDENCE DISCOVERY<br/>introduction<br/>discover motions in civil and criminal cases<br/>summary<br/><br/>CHAPTER 15: DISCOVERY OF DIGITAL EVIDENCE IN CRIMINAL CASES<br/>introduction<br/>sources of digital evidence<br/>electronic discovery in particular<br/>e.tc<br/><br/>CHAPTER 16: DISCOVERY OF DIGITAL EVIDENCE IN CIVIL CASES<br/>introduction<br/>rules governing civil discovery<br/>electronic discovery in particular<br/>e.tc<br/><br/>CHAPTER 17: DISCOVERY OF COMPUTERS AND STORAGE MEDIA<br/>Introduction<br/>an example of a simple consent to search agreement<br/>example of a simple order for expedited discovery<br/>e.tc<br/><br/>CHAPTER 18: DISCOVERY OF VIDEO EVIDENCE<br/>introduction<br/>common issues with video evidence<br/>collecting video evidence<br/>e.tc<br/><br/>CHAPTER 19: DISCOVERY OF AUDIO EVIDENCE<br/>introduction<br/>common issues with audio evidence<br/>example discovery language for audio<br/>e.tc<br/><br/>CHAPTER 20: DISCOVERY OF SOCIAL MEDIA EVIDENCE<br/>Introduction<br/>Legal issues in social media discovery<br/>finding custodian of records contact information<br/>Facebook<br/>e.tc<br/><br/>CHAPTER 21: DISCOVERY IN CHILD PORNOGRAPHY CASES<br/>introduction<br/>The Adam Walsh child protection and safety act of 2006<br/>the discovery of process<br/>e.tc<br/><br/>CHAPTER 22: DISCOVERY OF INTERNET SERVICE PROVIDER RECORDS<br/>introduction<br/>internet service provider records or IP addresses<br/>Example language for web-based e-mail addresses<br/>e.tc<br/><br/>CHAPTER 23: DISCOVERY OF GLOBAL POSITIONING SYSTEM EVIDENCE<br/>introduction<br/>GPS tracking evidence overview<br/>discovery of GPS evidence<br/>e.tc<br/><br/>CHAPTER 24: DISCOVERY OF CALL DETAIL RECORDS<br/>Introduction<br/>discovery issues in cellular evidence<br/>example language for call detail records<br/>e.tc<br/><br/>CHAPTER 25: OBATAINING EXPERT FUNDING IN INDIGENT CASES<br/>Introduction<br/>Hash values<br/>How hash values are used in digital forensics<br/>e.tc<br/><br/>CHAPTER 26: HASH VALUES: THE VERIFICATION STANDARD<br/>introduction<br/>hash values are used in digital forensics<br/>e.tc<br/><br/>how hash values<br/>CHAPTER 27: METADATA<br/>Introduction<br/>The purpose of metadata<br/>common types of metadata<br/>e.tc<br/><br/>CHAPTER 28: THUMBNAILS AND THE THUMBNAIL CACHE<br/>introduction<br/>thumbnails and the thumbnail cache<br/>how thumbnail and the thumbnail cache work<br/>e.tc<br/><br/>CHAPTER 29: DELETED DATA<br/>introduction<br/>how data is stored on a hard drive<br/>deleted file recovery<br/>e.tc<br/><br/>CHAPTER 30: COMPUTER TIME ARTIFACTS<br/>introduction<br/>computer file system time stamps<br/>fundamental issues in forensic analysis of timeline<br/>e.tc<br/><br/>CHAPTER 31: INTERNET HISTORY(WEB AND BROWSER CACHING)<br/>introduction<br/>what is web caching<br/>how internet browser caching works<br/>e.tc<br/><br/>CHAPTER 32: WINDOWS SHORTCUT FILES (LINK FILES)<br/>introduction<br/>the purpose of link files, how they are created and how they work<br/>how link files can be of evidentiary value<br/>e.tc<br/><br/>CHAPTER 33: CELLULAR SYSTEM EIDENCE AND CALL DETAIL RECORDS<br/>introduction<br/>an overview of the cellular phone systems<br/>how cell phones work<br/>e.tc<br/><br/>CHAPTER 34: E-MAIL EVIDENCE<br/>introduction<br/>email as evidence<br/>email storage and access: where is it<br/>web mail<br/>e.tc<br/><br/>CHAPTER 35: SOCIAL MEDIA<br/>introduction<br/>common forms of social networking<br/>evidence out in the open<br/>e.tc<br/><br/>CHAPTER 36: PEER-TO-PEER NETWORKS AND FILE SHARING<br/>introduction<br/>what is peer to peer sharing<br/>how it works<br/>e.tc<br/><br/>CHAPTER 37: CELL PHONES<br/>introduction<br/>the fragile nature of cellular evidence<br/>forensic acquisition methods for cellular phones<br/>e.tc<br/> <br/>CHAPTER 38: VIDEO AND PHOTO EVIDENCE<br/>introduction<br/>the most critical steps in the forensic examination of video and photo evidence<br/>using video and photo evidence in cases<br/>e.tc<br/><br/>CHAPTER 39: DATABASES<br/>introduction<br/>databases in everyday life<br/>what is a database<br/>e.tc<br/><br/>CHAPTER 40: ACCOUNTING SYSTEMS AND FINANCIAL SOFTWARE<br/>introduction<br/>accounting and money management programs<br/>personal money management software<br/>e.tc<br/><br/>CHAPTER 41: MULTIPLAYER ONLINE GAMES<br/>introduction<br/>the culture of massively multiplayer online role playing games<br/>MMORPG data as evidence<br/>e.tc<br/><br/>CHAPTER 42: GLOBAL POSITIONING SYSTEMS<br/>introduction<br/>an overview of global positioning systems<br/>an overview of the navstar global<br/>e.tc<br/><br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes Bibliographic references and Index p. 321-330
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic discovery (Law)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Digital forensic science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Evidence, Documentary
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer files
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Law and legislation
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Daniel, Lars E.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Classification part 347.7364
Item part 1
Call number prefix DAN
Call number suffix 347.7364 DAN
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/25/2021 Purchased 0027635   347.7364 DAN 1 BUML24010220 09/25/2021 1 09/25/2021 Book Closed Access