|
![]() |
|||
|
||||
OverviewGoing far beyond typical computer forensics books, this thoroughly revised edition of an Artech House bestseller is the only book on the market that focuses on how to protect one's privacy from data theft, hostile computer forensics, and legal action. It addresses the concerns of today's IT professionals, as well as many users of personal computers, offering more detailed ""how to"" guidance on protecting the confidentiality of data stored on computers. Moreover, the second edition has been updated to include specific information on the vulnerabilities of ancillary computing devices, such as PDAs, cellular telephones and smart cards. This cutting-edge book identifies the specific areas where sensitive and potentially incriminating data is hiding in computers and consumer electronics, and explains how to go about removing this data. The book provides a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer Full Product DetailsAuthor: Michael CaloyannidesPublisher: Artech House Publishers Imprint: Artech House Publishers Edition: Unabridged edition Dimensions: Width: 18.30cm , Height: 2.40cm , Length: 26.00cm Weight: 0.798kg ISBN: 9781580538305ISBN 10: 1580538304 Pages: 364 Publication Date: 30 September 2004 Audience: General/trade , General Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsWhat Is Computer Forensics and Why Is It of Vital Interest to You? Exactly Where Is Potentially Incriminating Data Stored in One's Computer and How Did It Get There. Specialized Forensics Techniques. Practical Means of Protecting Proprietary and Other Confidential Information in Computers. Protection from Online Computer Forensics and from Privacy Compromises: Legal Issues. Security Aspects of Evolving Technologies.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |