|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn852491280 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
130711s2012 xx a o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCA
|d CNMTR
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d CEF
|d OCLCA
|d UAB
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781118236086
|
020 |
|
|
|a 1118236084
|
020 |
|
|
|a 1118163826
|
020 |
|
|
|a 9781118163825
|
020 |
|
|
|z 9781118163825
|
029 |
1 |
|
|a AU@
|b 000052007449
|
029 |
1 |
|
|a DEBBG
|b BV041431474
|
029 |
1 |
|
|a DEBSZ
|b 398273278
|
035 |
|
|
|a (OCoLC)852491280
|
037 |
|
|
|a CL0500000234
|b Safari Books Online
|
050 |
|
4 |
|a HV8079.C65
|b A57 2012
|
082 |
0 |
4 |
|a 363.25968
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Mastering Windows network forensics and investigation /
|c Steve Anson [and others].
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a [Place of publication not identified] :
|b Sybex,
|c 2012.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Network investigation overview -- The Microsoft network structure -- Beyond the Windows GUI -- Windows password issues -- Windows ports and services -- Live-analysis techniques -- Windows filesystems -- The registry structure -- Registry evidence -- Introduction to malware -- Text-based logs -- Windows event logs -- Logon and account logon events -- Other audit events -- Forensic analysis of event logs -- Presenting the results -- The challenges of cloud computing and virtualization.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 blmlsh
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Anson, Steve.
|
776 |
0 |
8 |
|i Print version:
|t Mastering Windows network forensics and investigation.
|b 2nd ed.
|d Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2012
|z 9781118163825
|w (OCoLC)768072256
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118236086/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|