|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1348109582 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221018s2017 xx 157 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d UMI
|d S9I
|d OCLCO
|
019 |
|
|
|a 1019685173
|a 1362788897
|
020 |
|
|
|a 9781492029120
|q (electronic video)
|
020 |
|
|
|a 1492029122
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000073549297
|
035 |
|
|
|a (OCoLC)1348109582
|z (OCoLC)1019685173
|z (OCoLC)1362788897
|
037 |
|
|
|a 9781492029120
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20221018
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Forensic analysis of disk-based evidence.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c [2017]
|
300 |
|
|
|a 1 online resource (1 video file (2 hr., 37 min.)) :
|b sound, color.
|
306 |
|
|
|a 023700
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Ric Messier, presenter.
|
520 |
|
|
|a Today, our information- and knowledge-based economy generates vast amounts of data that is at some point saved to storage devices, such as hard drives or solid-state drives or chips, or portable devices like USB sticks. Still and video cameras also contain cards to store images. Understanding how all of these devices are formatted and how to get data from them is critical to a forensic investigator. Both law enforcement and corporate investigators need to understand the value and techniques of searching for evidence of crime or intrusions on computer systems. Designed for people with entry- to intermediate-level knowledge of computer systems and data storage systems, this course benefits those without much practical experience in regard to digital forensics and includes instruction and demonstrations. In it, you'll see how to use SleuthKit, an open source collection of command-line tools and a C library with which you can analyze disk images. You'll learn about the main file storage architectures such as File Allocation Table (FAT), NT File System (NTFS), and ext2/3. You'll learn how to conduct basic forensic procedures to extract valuable information that could be crucial in uncovering illegal activities or revealing whether a device has been the target of an attack.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Hard disks (Computer science)
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Disques rigides
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
655 |
|
2 |
|a Webcast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Messier, Ric,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781492029120/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|