Cargando…

Computer forensics : incident response essentials /

"Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encry...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kruse, Warren G.
Otros Autores: Heiser, Jay G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston, MA : Addison-Wesley, 2001.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn608327068
003 OCoLC
005 20231017213018.0
006 m o d
007 cr un||||a|a||
008 100420s2001 maua ob 001 0 eng d
040 |a OCLCE  |b eng  |e pn  |c OCLCE  |d OCLCQ  |d UMI  |d HEBIS  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCF  |d IDEBK  |d OCLCQ  |d YDX  |d OCLCQ  |d OCLCA  |d KIJ  |d CEF  |d AU@  |d WYU  |d OCLCQ  |d VT2  |d UAB  |d OCLCQ  |d OCLCO  |d UKOBU  |d OCLCQ  |d OCLCO 
019 |a 606586746  |a 738406399  |a 1027323083  |a 1044602036  |a 1056445089  |a 1058906230  |a 1060868042  |a 1062897346  |a 1073047418  |a 1083237105  |a 1097149420  |a 1202542005  |a 1240518110 
020 |a 9780672333989 
020 |a 0672333988 
020 |a 9781282692022 
020 |a 128269202X 
020 |a 9786612692024 
020 |a 6612692022 
020 |z 0201707195 
020 |z 9780201707199 
029 1 |a AU@  |b 000067114029 
029 1 |a DEBSZ  |b 368470423 
029 1 |a GBVCP  |b 672798301 
029 1 |a HEBIS  |b 291537553 
029 1 |a AU@  |b 000057226537 
035 |a (OCoLC)608327068  |z (OCoLC)606586746  |z (OCoLC)738406399  |z (OCoLC)1027323083  |z (OCoLC)1044602036  |z (OCoLC)1056445089  |z (OCoLC)1058906230  |z (OCoLC)1060868042  |z (OCoLC)1062897346  |z (OCoLC)1073047418  |z (OCoLC)1083237105  |z (OCoLC)1097149420  |z (OCoLC)1202542005  |z (OCoLC)1240518110 
037 |a CL0500000093  |b Safari Books Online 
042 |a dlr 
050 4 |a QA76.9.A25  |b K78 2001 
082 0 4 |a 005.8  |2 21 
082 0 4 |a 363.25968  |2 21 
084 |a 54.61  |2 bcl 
049 |a UAMI 
100 1 |a Kruse, Warren G. 
245 1 0 |a Computer forensics :  |b incident response essentials /  |c Warren G. Kruse II, Jay G. Heiser. 
260 |a Boston, MA :  |b Addison-Wesley,  |c 2001. 
300 |a 1 online resource (xiii, 392) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 381-384) and index. 
505 0 |a Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system. 
520 1 |a "Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--Jacket 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Forensic sciences. 
650 2 |a Computer Security 
650 2 |a Forensic Sciences 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Criminalistique. 
650 7 |a forensic science.  |2 aat 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Forensic sciences  |2 fast 
650 1 7 |a Computerbeveiliging.  |2 gtt 
650 1 7 |a Computercriminaliteit.  |2 gtt 
650 1 7 |a Gerechtelijke technologie.  |2 gtt 
700 1 |a Heiser, Jay G. 
776 0 8 |i Print version:  |a Kruse, Warren G.  |t Computer forensics.  |d Boston, MA : Addison-Wesley, 2001  |w (DLC) 2001034106  |w (OCoLC)47098296 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780672333989/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis23979022 
938 |a YBP Library Services  |b YANK  |n 14857092 
994 |a 92  |b IZTAP