List of Sidebars

 < Day Day Up > 

 



Chapter 1: Computer Forensics Fundamentals

Provide Expert Consultation and Expert Witness Services Computers

Chapter 2: Types of Computer Forensics Technology

Mirror Image Backup Software
ANADISK DISKETTE ANALYSIS TOOL
Text Search Plus
Intelligent Forensic Filter

Chapter 3: Types of Vendor and Computer Forensics Services

The Difficulties Of High-Speed Intrusion Detection
Computer Forensic Incident Response Procedures (CFIRP)
Evidence Capture
Computer Forensics Certified

Chapter 6: Duplication and Preservation of Digital Evidence

Emergency Guidelines

Chapter 7: Computer Image Verification and Authentication

Digital Ids And Authentication Technology

Chapter 12: Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups

Doomsday Software
Israel’s Cyberwar Seminar

Chapter 13: The Information Warfare Arsenal and Tactics of the Military

Renegotiating The Human–Machine Interface
Agent-Based Systems
Cyberoffense Mired In Cold War
Military Tests Digital Forces

Chapter 14: The Information Warfare Arsenal and Tactics of Terrorists and Rogues

Bin Laden Uses Web To Plan
Stopping Nuclear Blackmail
Chemical And Biological Terrorism
Hacker-Controlled Tanks, Planes, And Warships
The Dark World Of The Cyber Underground
Bioterrorists On The Green
Espionage By Keystroke?
Cyberspace Incidents On The Rise In China
China Grabs U.S. Technology To Modernize Its Military
Putting Terror Inc. On Trial
Infidels
Has Cuba Joined The Iw Games?

Chapter 15: The Information Warfare Arsenal and Tactics of Private Companies

Five Easy Steps To Planning And Launching A Cyberattack
Data Protection Measure Tips
Privacy Agreements

Chapter 16: Information Warfare: Arsenal of the Future

Will The Real La Femme Nikita Stand Up
Helping Hackers Take Control Of Military Satellites
Privacy Concerns Remain
The Privacy Foundation

Chapter 18: Civilian Casualties—The Victims and Refugees of Information Warfare

Electric Power System Vulnerabilities
Widespread Break-In By Crime Groups Cause Damage
Hacker Insurance
Cyberattack Protection Plan
Checking Fingerprints
Patient Files Copied By Hacker
New Medical Privacy Rules

Chapter 19: Advanced Computer Forensics

Computer-Free Encryption
A Menu Of Symmetric Encryption Algorithms
Human And Hardware Frailties
Hack Yourself Before Somebody Else Does
Future Threat: Advanced Malicious Code In Software
The Costs Of Tracking A Hacker
Insider Accounts



 < Day Day Up > 

 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net