O'Reilly logo

Computer Evidence: Collection and Preservation, Second Edition by Christopher L. T. Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Audit

The audit of information systems has been necessary since the early days of computing. Configuration management of mainframe controls is an area where information systems audits first gained visibility as a practice needing great structure and refinement. As far back as 1969, a group of professionals formed the Information Systems Audit and Control Association (ISACA) to create a centralized source of information and guidance in the field. The ISACA Web site is available at http://www.isaca.org.

Caution

No one should ever conduct a port scan, vulnerability test, or pen test without written authorization.

For the computer forensics investigator, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required