|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn166388052 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
070829s2007 xx ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d YDXCP
|d BAKER
|d OCLCQ
|d DKDLA
|d OCLCQ
|d OCLCF
|d UMI
|d DEBBG
|d OCLCQ
|d OCLCA
|d D6H
|d CEF
|d UAB
|d LEAUB
|d AU@
|d OCLCQ
|d KSU
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 171111157
|a 488135285
|a 767763310
|a 874926438
|
020 |
|
|
|a 9781597491976
|
020 |
|
|
|a 1597491977
|
020 |
|
|
|a 9780080555713
|
020 |
|
|
|a 0080555713
|
029 |
1 |
|
|a AU@
|b 000060844887
|
029 |
1 |
|
|a CHBIS
|b 005828111
|
029 |
1 |
|
|a CHNEW
|b 001007080
|
029 |
1 |
|
|a CHVBK
|b 168565919
|
029 |
1 |
|
|a DEBBG
|b BV039828934
|
029 |
1 |
|
|a DEBBG
|b BV042031492
|
029 |
1 |
|
|a DEBBG
|b BV042314238
|
029 |
1 |
|
|a DEBSZ
|b 405315775
|
029 |
1 |
|
|a DEBSZ
|b 41416945X
|
029 |
1 |
|
|a NZ1
|b 12059938
|
029 |
1 |
|
|a NZ1
|b 15189279
|
035 |
|
|
|a (OCoLC)166388052
|z (OCoLC)171111157
|z (OCoLC)488135285
|z (OCoLC)767763310
|z (OCoLC)874926438
|
037 |
|
|
|a 141248:141391
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a QA76.9.A25
|b O34 2007eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
4 |
|a The official CHFI study guide (Exam 312-49) :
|b for computer hacking forensic investigator.
|
260 |
|
|
|a [Place of publication not identified] :
|b Syngress,
|c 2007.
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a This is the official CHFI study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit. The material is presented in a logical learning sequence: a section builds upon previous sections and a chapter on previous chapters. All concepts, simple and complex, are defined and explained when they appear for the first time. This book includes the following special chapter elements: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight the crucial points, Exams Eye View section at the end of each chapter emphasizes the important points from the exams perspective, Key Terms present the definitions of key terms used in the chapter, Review Questions section at the end of each chapter that contains the questions modeled after the real exam questions based on the material covered in the chapter. The answers to these questions are presented with explanations in an appendix. Also included is a full practice exam modeled after the real exam. The answers to the exam questions are presented with full explanations. * The only study guide for CHFI, provides 100% coverage of all exam objectives. * Full web-based practice exam with explanations of correct and incorrect answers * Forensics xxxxx.
|
505 |
0 |
|
|a Computer Forensics in Todays World -- Law And Computer Forensics -- Computer Investigation Process -- Computer Security Incident Response Team -- Computer Forensic Laboratory Requirements -- Understanding File systems and Hard disks -- Windows Forensics -- Linux and Macintosh Boot processes -- Linux Forensics -- Data Acquisition and Duplication -- Recovering Deleted Files -- Image Files Forensics -- Steganography -- Computer Forensic Tools -- Application password crackers -- Investigating Logs -- Investigating network traffic -- Router Forensics -- Investigating Web Attacks -- Tracking E-mails and Investigating E-mail crimes -- Mobile and PDA Forensics -- Investigating Trademark and Copyright Infringement -- Investigative Reports -- Becoming an Expert Witness -- Forensics in action.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Kleiman, Dave.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597491976/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Baker & Taylor
|b BKTY
|c 59.95
|d 59.95
|i 1597491977
|n 0007189097
|s active
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2563350
|
994 |
|
|
|a 92
|b IZTAP
|