| 000 | 03685cam a2200409 i 4500 | ||
|---|---|---|---|
| 005 | 20250919124915.0 | ||
| 008 | 181121s2018 xxua 001 0 eng | ||
| 010 | _a2018-016097 | ||
| 020 |
_a9781138720930 _qhardback _cRM256.10 |
||
| 035 | _a20487591 | ||
| 039 | 9 |
_a201812131543 _bathirah _c201811261343 _dzakir _c201811261341 _dzakir _c201811231014 _dzakir _y11-21-2018 _zzakir |
|
| 040 |
_aukm _erda |
||
| 090 | _aHV8079.C65S23 3 | ||
| 090 |
_aHV8079.C65 _bS23 |
||
| 100 | 1 |
_aSachowski, Jason, _eauthor. |
|
| 245 | 1 | 0 |
_aDigital forensics and investigations : _bpeople, processes, and technologies to defend the enterprise / _cJason Sachowski. |
| 264 | 1 |
_aBoca Raton, FL : _bCRC Press, Taylor & Francis Group, _c[2018]. |
|
| 264 | 4 | _c©2018. | |
| 300 |
_axviii, 398 pages : _billustrations ; _c24 cm. |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 504 | _aIncludes bibliographical references (pages 329-335) and index. | ||
| 505 | 0 | _aIntroduction to digital forensics -- Investigative process methodology -- Education, training, and awareness -- Laws, standards, and regulations -- Ethics and professional conduct -- The business of digital forensics -- Controlling mobile devices -- Cloud computing enablement -- Combating anti-forensics -- Digital evidence management -- Digital forensic readiness -- Incident management and response -- Electronic discovery and litigation support -- Information and cyber security. | |
| 520 |
_a'Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques have remained consistent despite the evolution of technology, and, ultimately, it and can be applied to any form of digital data. However, within a corporate environment, digital forensic professionals are particularly challenged. They must maintain the legal admissibility and forensic viability of digital evidence in support of a broad range of different business functions that include incident response, electronic discovery (ediscovery), and ensuring the controls and accountability of such information across networks. Digital Forensics and Investigations: People, Process, and Technologies to Defend the Enterprise provides the methodologies and strategies necessary for these key business functions to seamlessly integrate digital forensic capabilities to guarantee the admissibility and integrity of digital evidence. In many books, the focus on digital evidence is primarily in the technical, software, and investigative elements, of which there are numerous publications. What tends to get overlooked are the people and process elements within the organization. Taking a step back, the book outlines the importance of integrating and accounting for the people, process, and technology components of digital forensics. In essence, to establish a holistic paradigm--and best-practice procedure and policy approach--to defending the enterprise. This book serves as a roadmap for professionals to successfully integrate an organization's people, process, and technology with other key business functions in an enterprise's digital forensic capabilities'-- _cProvided by publisher. |
||
| 650 | 0 |
_aComputer crimes _xInvestigation. |
|
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aForensic sciences. | |
| 907 |
_a.b16653117 _b2019-11-12 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kHV8079.C65S23 3 |
||
| 914 | _avtls003640579 | ||
| 990 | _azak | ||
| 991 | _aFakulti Teknologi dan Sains Maklumat | ||
| 998 |
_al _b2018-08-11 _cm _da _feng _gxxu _y0 _z.b16653117 |
||
| 999 |
_c633498 _d633498 |
||