000 04585cam a2200613M 4500
001 9781003057888
003 FlBoTFG
005 20240213122831.0
006 m o d
007 cr |n|||||||||
008 210729s2021 xx o 0|| 0 eng d
040 _aOCoLC-P
_beng
_cOCoLC-P
020 _a9781000424881
_q(electronic bk.)
020 _a100042488X
_q(electronic bk.)
020 _a9781000424935
_q(ePub ebook)
020 _a1000424936
020 _a9781003057888
_q(ebook)
020 _a1003057888
020 _z036752418X
020 _z9780367524180
020 _z9780367524241
020 _z0367524244
024 7 _a10.1201/9781003057888
_2doi
035 _a(OCoLC)1262124342
035 _a(OCoLC-P)1262124342
050 4 _aHV8073
_b.M37 2021
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aLAW
_x041000
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aJKVF1
_2bicssc
082 0 4 _a363.250285
_223
245 0 0 _aCYBER FORENSICS
_h[electronic resource] :
_bexamining emerging and hybrid technologies.
260 _a[S.l.] :
_bCRC PRESS,
_c2021.
300 _a1 online resource
336 _atext
_2rdacontent
336 _astill image
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
505 0 _a<P>Chapter 1 -- Cyber Forensics: Compliance and Auditing</p><p>Chapter 2 -- IoT and the Role of Cyber Forensics</p><p>Chapter 3 -- Cyber Forensics Examination of Unmanned Aerial Systems (UAS) and Unmanned Aerial Vehicles (UAV)</p><p>Chapter 4 -- Cloud Computing Forensics</p><p>Chapter 5 -- Forensics of the Digital Social Triangle with an Emphasis on Deep Fakes.</p><p>Chapter 6 -- Operational Technology, Security and Cyber Forensics</p><p>Chapter 7 -- Cyber Forensics and Risk Management.</p><p>Chapter 8 -- Mobile Device Forensics: An Introduction</p><p>Chapter 9 -- Forensic Accounting and the Use of E-Discovery and Cyber Forensics </p><p>Chapter 10 -- Cyber Forensic Tools and Utilities</p>
520 _aThreat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aForensic sciences
_xTechnological innovations.
650 0 _aElectronic evidence.
650 0 _aEvidence, Criminal.
650 0 _aCriminal investigation.
650 0 _aComputer crimes
_xInvestigation.
650 7 _aCOMPUTERS / Security / General
_2bisacsh
650 7 _aLAW / Forensic Science
_2bisacsh
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
700 1 _aMarcella, Albert J.
700 1 _aGreenfield, Robert S.,
_d1961-
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003057888
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c5754
_d5754