Ebook Privacy protection and computer forensics (Second edition): Part 1
Số trang: 147
Loại file: pdf
Dung lượng: 1.74 MB
Lượt xem: 18
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 1 computer forensics, chapter 2 locating your sensitive data in your computer, chapter 3 specialized forensics applications, chapter 4 how can sensitive data be stolen from one's computer? chapter 5 why computer privacy and anonymity? chapter 6 practical measures for protecting sensitive information, chapter 7 basic protection from computer data theft online.
Nội dung trích xuất từ tài liệu:
Ebook Privacy protection and computer forensics (Second edition): Part 1 Privacy Protection and Computer Forensics Second Edition For quite a long time, computer security was a rather narrow field of study that was popu- lated mainly by theoretical computer scientists, electrical engineers, and applied mathema- ticians. With the proliferation of open systems in general, and of the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, com- puter and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to elec- tronic commerce. Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the- art, high standard technical books on topics related to computer security. Further informa- tion about the series can be found on the WWW at the following URL: http://www.esecurity.ch/serieseditor.html Also, if you’d like to contribute to the series by writing a book about a topic related to computer security, feel free to contact either the Commissioning Editor or the Series Editor at Artech House. For a listing of recent titles in the Artech House Computer Security Series, turn to the back of this book. Privacy Protection and Computer Forensics Second Edition Michael A. Caloyannides Artech House Boston • London www.artechhouse.com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data A catalog record for this book is available from the British Library. Cover design by Yekaterina Ratner © 2004 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-830-4 10 9 8 7 6 5 4 3 2 1 To my late parents, Akylas and Etta. Parents never die; they live through their children’s thoughts and actions and through their children’s children. . Contents Introduction . . . . . . . . . . . . . xv 1 Computer Forensics . . . . . . . . . . . 1 1.1 What is computer forensics? 1 1.2 Why is computer forensics of vital interest to you? 1 1.2.1 As an employee 1 1.2.2 As an employer or corporate executive 2 1.2.3 As a law enforcement official 3 1.2.4 As an individual 4 1.2.5 As a lawyer for the defense 5 1.2.6 As an insurance company 6 1.2.7 As a user of others’ computers 6 1.3 If you have done nothing illegal, you have nothing to fear: not true anywhere! 6 1.4 Computer forensics 8 1.4.1 User rights to privacy? 8 1.4.2 The forensics investigator must know up front 9 1.4.3 Forensics is deceptively simple but requires vast expertise 9 1.4.4 Computer forensics top-level procedure 11 1.4.5 Forensics specifics 13 1.4.6 Digital evidence is often evidence of nothing 16 Selected bibliography 22 2 Locating Your Sensitive Data in Your Computer . . 23 2.1 Deleting does not delete—what does? 23 2.1.1 General 23 2.1.2 Disk wiping ...
Nội dung trích xuất từ tài liệu:
Ebook Privacy protection and computer forensics (Second edition): Part 1 Privacy Protection and Computer Forensics Second Edition For quite a long time, computer security was a rather narrow field of study that was popu- lated mainly by theoretical computer scientists, electrical engineers, and applied mathema- ticians. With the proliferation of open systems in general, and of the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, com- puter and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to elec- tronic commerce. Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the- art, high standard technical books on topics related to computer security. Further informa- tion about the series can be found on the WWW at the following URL: http://www.esecurity.ch/serieseditor.html Also, if you’d like to contribute to the series by writing a book about a topic related to computer security, feel free to contact either the Commissioning Editor or the Series Editor at Artech House. For a listing of recent titles in the Artech House Computer Security Series, turn to the back of this book. Privacy Protection and Computer Forensics Second Edition Michael A. Caloyannides Artech House Boston • London www.artechhouse.com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data A catalog record for this book is available from the British Library. Cover design by Yekaterina Ratner © 2004 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-830-4 10 9 8 7 6 5 4 3 2 1 To my late parents, Akylas and Etta. Parents never die; they live through their children’s thoughts and actions and through their children’s children. . Contents Introduction . . . . . . . . . . . . . xv 1 Computer Forensics . . . . . . . . . . . 1 1.1 What is computer forensics? 1 1.2 Why is computer forensics of vital interest to you? 1 1.2.1 As an employee 1 1.2.2 As an employer or corporate executive 2 1.2.3 As a law enforcement official 3 1.2.4 As an individual 4 1.2.5 As a lawyer for the defense 5 1.2.6 As an insurance company 6 1.2.7 As a user of others’ computers 6 1.3 If you have done nothing illegal, you have nothing to fear: not true anywhere! 6 1.4 Computer forensics 8 1.4.1 User rights to privacy? 8 1.4.2 The forensics investigator must know up front 9 1.4.3 Forensics is deceptively simple but requires vast expertise 9 1.4.4 Computer forensics top-level procedure 11 1.4.5 Forensics specifics 13 1.4.6 Digital evidence is often evidence of nothing 16 Selected bibliography 22 2 Locating Your Sensitive Data in Your Computer . . 23 2.1 Deleting does not delete—what does? 23 2.1.1 General 23 2.1.2 Disk wiping ...
Tìm kiếm theo từ khóa liên quan:
Privacy protection Computer forensics Computer security Information security Protecting sensitive information Pecialized forensics applications Computer data theft onlineGợi ý tài liệu liên quan:
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 268 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 1
131 trang 117 0 0 -
Ebook The Database hacker's handbook: Defending database servers – Part 1
280 trang 115 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 2
226 trang 105 0 0 -
Ebook Protecting your library's digital sources: the essential guide to planning and preservation
121 trang 98 0 0 -
Guide to Computer forensics and investigations - Chapter 5: Working with Windows and CLI systems
75 trang 48 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 47 0 0 -
Ebook Information security fundamentals: Part 2
144 trang 46 0 0 -
Ebook Security power tools: Part 2
505 trang 43 0 0 -
Ebook Security in wireless mesh networks: Part 1
357 trang 42 0 0