|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1348105074 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221018s2017 xx 099 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d UMI
|d TOH
|d S9I
|d OCLCO
|
019 |
|
|
|a 1019901826
|a 1362787397
|
020 |
|
|
|a 9781492029205
|q (electronic video)
|
020 |
|
|
|a 1492029203
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000072848742
|
035 |
|
|
|a (OCoLC)1348105074
|z (OCoLC)1019901826
|z (OCoLC)1362787397
|
037 |
|
|
|a 9781492029205
|b O'Reilly Media
|
050 |
|
4 |
|a HV8079.C65
|
082 |
0 |
4 |
|a 363.25/968
|2 23/eng/20221018
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Operating system forensic analysis.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c [2017]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 39 min.)) :
|b sound, color.
|
306 |
|
|
|a 013900
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Ric Messier, presenter.
|
520 |
|
|
|a Files, email messages, and social media posts all contain valuable information for digital forensic investigators when searching for evidence of a crime or intrusions into a computer system or network, but there's also a wealth of information to be gleaned from a computer's operating system. This includes user data, configuration settings, and a significant trail of user activities. Today, there are a number of tools available to extract and analyze this information. In this course designed for entry- to intermediate-level law enforcement and corporate investigators, you'll learn how to use readily available, open source tools to find valuable information in the Windows Registry. You'll also see how to create and use logs with Windows Event Log and Linux Syslog, which you then can examine for traces of suspicious or unauthorized activity. Finally, you'll look at the techniques employed by investigators to handle and process all of this important information to assist you in your forensic tasks.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Operating systems (Computers)
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Evidence preservation
|x Standards.
|
650 |
|
0 |
|a Mobile device forensics.
|
650 |
|
0 |
|a Forensic sciences
|x Standards.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Preuve (Droit pénal)
|x Conservation
|x Normes.
|
650 |
|
6 |
|a Analyse judiciaire des appareils mobiles.
|
650 |
|
6 |
|a Criminalistique
|x Normes.
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Operating systems (Computers)
|x Security measures
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Messier, Ric,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781492029205/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|