MARC details
000 -LEADER |
fixed length control field |
06972nam a22002777a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240112071850.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210925b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781597496438 (pbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BUL |
Transcribing agency |
BUL |
Modifying agency |
BUL |
Language of cataloging |
eng |
Description conventions |
rda |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
347.7364 |
Edition number |
23 |
Item number |
DAN |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Daniel, Larry E. |
245 10 - TITLE STATEMENT |
Title |
Digital forensics for legal professionals : |
Remainder of title |
understanding digital evidence from the warrant to the courtroom / |
Statement of responsibility, etc. |
Larry Daniel, and Lars Daniel. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Waltham, MA : |
Name of publisher, distributor, etc. |
Syngress/Elsevier, |
Date of publication, distribution, etc. |
c2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxi, 330 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
CONTENTS<br/><br/>CHAPTER 1: DIGITAL EVIDENCE IS EVERYWHERE<br/>Introduction<br/>what is digital forensics<br/>what is digital evidence<br/>how digital evidence is created and stored<br/>summary<br/><br/>CHAPTER 2: OVERVIEW OF DIGITAL FORENSICS<br/>introduction<br/>digital forensics<br/>a little computer history<br/>a brief history of computer forensics<br/>computer forensics becomes digital forensics<br/>summary<br/><br/>CHAPTER 3: DIGITAL FORENSICS: THE SUBDISCIPLINES<br/>introduction<br/>the subdisciplines<br/>computer forensics<br/>summary<br/><br/>CHAPTER 4: THE FOUNDATIONS OF DIGITAL FORENSICS: BEST PRACTICES<br/>Introduction<br/>Who establishes best practices<br/>who should be following best practices<br/>e.tc<br/><br/>CHAPTER 5: DIGITAL FORENSICS AT WORK IN THE LEGAL SYSTEM<br/>Introduction<br/>what makes a tool forensically sound<br/>who performs tool testing<br/>computer forensics tools: an overview<br/>e.tc<br/><br/>CHAPTER 6: DIGITAL FORENSICS AT WORK IN THE LEGAL SYSTEM<br/>Introduction<br/>mitigation<br/>pre-trial motions<br/>trial preparation<br/>e.tc<br/><br/>CHAPTER 7: WHY DO I NEED AN EXPERT<br/>Introduction<br/>why hire a digital forensics expert<br/>when to hire a digital Forensics expert<br/>e.tc<br/><br/>CHAPTER 8: THE DIFFERENCE BETWEEN COMPUTER EXPERTS AND DIGITAL FORENSICS EXPERTS<br/>Introduction<br/>the computer expert<br/>The digital forensics expert<br/>A side by side comparison<br/>e.tc<br/><br/>CHAPTER 9: SELECTING A DIGITAL FORENSICS EXPERT<br/>Introduction<br/>what is an expert<br/>locating and selecting an expert<br/>certifications<br/>e.tc<br/><br/>CHAPTER 10: WHAT TO EXPECT FROM AN EXPERT<br/>Introduction<br/>general expectations<br/>where to begin<br/>the examination<br/>court preparation<br/><br/>CHAPTER 11: APPROCHES BY DIFFERENT TYPES OF EXAMINERS<br/>Introduction<br/>Standards<br/>Training and experience<br/>impact on examinations<br/>e.tc<br/><br/>CHAPTER 12: SPOTTING A PROBLEM EXPERT<br/>Introduction<br/>beyond the window dressings<br/>e.tc<br/><br/>CHAPTER 13: QUALIFYING AN EXPERT IN COURT<br/>Introduction<br/>Qualifying an expert<br/>Qualifying experts in court<br/>e.tc<br/><br/>CHAPTER 14: OVERVIEW OF DIGITAL EVIDENCE DISCOVERY<br/>introduction<br/>discover motions in civil and criminal cases<br/>summary<br/><br/>CHAPTER 15: DISCOVERY OF DIGITAL EVIDENCE IN CRIMINAL CASES<br/>introduction<br/>sources of digital evidence<br/>electronic discovery in particular<br/>e.tc<br/><br/>CHAPTER 16: DISCOVERY OF DIGITAL EVIDENCE IN CIVIL CASES<br/>introduction<br/>rules governing civil discovery<br/>electronic discovery in particular<br/>e.tc<br/><br/>CHAPTER 17: DISCOVERY OF COMPUTERS AND STORAGE MEDIA<br/>Introduction<br/>an example of a simple consent to search agreement<br/>example of a simple order for expedited discovery<br/>e.tc<br/><br/>CHAPTER 18: DISCOVERY OF VIDEO EVIDENCE<br/>introduction<br/>common issues with video evidence<br/>collecting video evidence<br/>e.tc<br/><br/>CHAPTER 19: DISCOVERY OF AUDIO EVIDENCE<br/>introduction<br/>common issues with audio evidence<br/>example discovery language for audio<br/>e.tc<br/><br/>CHAPTER 20: DISCOVERY OF SOCIAL MEDIA EVIDENCE<br/>Introduction<br/>Legal issues in social media discovery<br/>finding custodian of records contact information<br/>Facebook<br/>e.tc<br/><br/>CHAPTER 21: DISCOVERY IN CHILD PORNOGRAPHY CASES<br/>introduction<br/>The Adam Walsh child protection and safety act of 2006<br/>the discovery of process<br/>e.tc<br/><br/>CHAPTER 22: DISCOVERY OF INTERNET SERVICE PROVIDER RECORDS<br/>introduction<br/>internet service provider records or IP addresses<br/>Example language for web-based e-mail addresses<br/>e.tc<br/><br/>CHAPTER 23: DISCOVERY OF GLOBAL POSITIONING SYSTEM EVIDENCE<br/>introduction<br/>GPS tracking evidence overview<br/>discovery of GPS evidence<br/>e.tc<br/><br/>CHAPTER 24: DISCOVERY OF CALL DETAIL RECORDS<br/>Introduction<br/>discovery issues in cellular evidence<br/>example language for call detail records<br/>e.tc<br/><br/>CHAPTER 25: OBATAINING EXPERT FUNDING IN INDIGENT CASES<br/>Introduction<br/>Hash values<br/>How hash values are used in digital forensics<br/>e.tc<br/><br/>CHAPTER 26: HASH VALUES: THE VERIFICATION STANDARD<br/>introduction<br/>hash values are used in digital forensics<br/>e.tc<br/><br/>how hash values<br/>CHAPTER 27: METADATA<br/>Introduction<br/>The purpose of metadata<br/>common types of metadata<br/>e.tc<br/><br/>CHAPTER 28: THUMBNAILS AND THE THUMBNAIL CACHE<br/>introduction<br/>thumbnails and the thumbnail cache<br/>how thumbnail and the thumbnail cache work<br/>e.tc<br/><br/>CHAPTER 29: DELETED DATA<br/>introduction<br/>how data is stored on a hard drive<br/>deleted file recovery<br/>e.tc<br/><br/>CHAPTER 30: COMPUTER TIME ARTIFACTS<br/>introduction<br/>computer file system time stamps<br/>fundamental issues in forensic analysis of timeline<br/>e.tc<br/><br/>CHAPTER 31: INTERNET HISTORY(WEB AND BROWSER CACHING)<br/>introduction<br/>what is web caching<br/>how internet browser caching works<br/>e.tc<br/><br/>CHAPTER 32: WINDOWS SHORTCUT FILES (LINK FILES)<br/>introduction<br/>the purpose of link files, how they are created and how they work<br/>how link files can be of evidentiary value<br/>e.tc<br/><br/>CHAPTER 33: CELLULAR SYSTEM EIDENCE AND CALL DETAIL RECORDS<br/>introduction<br/>an overview of the cellular phone systems<br/>how cell phones work<br/>e.tc<br/><br/>CHAPTER 34: E-MAIL EVIDENCE<br/>introduction<br/>email as evidence<br/>email storage and access: where is it<br/>web mail<br/>e.tc<br/><br/>CHAPTER 35: SOCIAL MEDIA<br/>introduction<br/>common forms of social networking<br/>evidence out in the open<br/>e.tc<br/><br/>CHAPTER 36: PEER-TO-PEER NETWORKS AND FILE SHARING<br/>introduction<br/>what is peer to peer sharing<br/>how it works<br/>e.tc<br/><br/>CHAPTER 37: CELL PHONES<br/>introduction<br/>the fragile nature of cellular evidence<br/>forensic acquisition methods for cellular phones<br/>e.tc<br/> <br/>CHAPTER 38: VIDEO AND PHOTO EVIDENCE<br/>introduction<br/>the most critical steps in the forensic examination of video and photo evidence<br/>using video and photo evidence in cases<br/>e.tc<br/><br/>CHAPTER 39: DATABASES<br/>introduction<br/>databases in everyday life<br/>what is a database<br/>e.tc<br/><br/>CHAPTER 40: ACCOUNTING SYSTEMS AND FINANCIAL SOFTWARE<br/>introduction<br/>accounting and money management programs<br/>personal money management software<br/>e.tc<br/><br/>CHAPTER 41: MULTIPLAYER ONLINE GAMES<br/>introduction<br/>the culture of massively multiplayer online role playing games<br/>MMORPG data as evidence<br/>e.tc<br/><br/>CHAPTER 42: GLOBAL POSITIONING SYSTEMS<br/>introduction<br/>an overview of global positioning systems<br/>an overview of the navstar global<br/>e.tc<br/><br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes Bibliographic references and Index p. 321-330 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Electronic discovery (Law) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Digital forensic science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Evidence, Documentary |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer files |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Law and legislation |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Daniel, Lars E. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book Closed Access |
Classification part |
347.7364 |
Item part |
1 |
Call number prefix |
DAN |
Call number suffix |
347.7364 DAN |