Cargando…

Guide to Computer Forensics and Investigations, 6th Edition

Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. Providing clear instruction on the tools and techniques of the trade, it wa...

Descripción completa

Detalles Bibliográficos
Autor principal: Bill Nelson (Autor)
Formato: Libro
Idioma:Inglés
Publicado: United States of America : Cengage Learning, 2018
United States of America :
Edición:sixth edition
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000nam#a2200000 4500
001 CENGAGE_9781337671095
003 VST
005 20230929160835.0
006 m o d
007 cr#un#---uucau
008 170822s2018 USA eng d
020 |a 9781337671095 
040 |a VST  |c VST  |d VST 
100 1 |a Bill Nelson  |e author 
245 1 0 |a Guide to Computer Forensics and Investigations, 6th Edition 
250 |a sixth edition 
260 |a United States of America : 
264 1 |a United States of America :  |b Cengage Learning,  |c 2018 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
520 |a Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. Providing clear instruction on the tools and techniques of the trade, it walks you through every step of the computer forensics investigation--from lab setup to testifying in court. The authors also thoroughly explain how to use current forensics software. The text includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. Appropriate for learners new to the field, it is also an excellent refresher and technology update for professionals in law enforcement, investigations or computer security. 
650 4 |a Computers/Security/General 
856 4 0 |u https://resolvervitalsource.uam.elogim.com/9781337671095  |z Texto completo