|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn298780453 |
003 |
OCoLC |
005 |
20231117015108.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
081125s2007 maua o 001 0 eng d |
010 |
|
|
|z 2008295064
|
040 |
|
|
|a CtWfDGI
|b eng
|e pn
|c COCUF
|d OCLCQ
|d UMI
|d CEF
|d E7B
|d OCLCQ
|d NHM
|d B24X7
|d DEBSZ
|d ITD
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d OPELS
|d OCLCQ
|d TXI
|d AZK
|d AGLDB
|d YT1
|d STF
|d MOR
|d PIFAG
|d LIV
|d OCLCQ
|d WRM
|d D6H
|d NRAMU
|d VT2
|d COO
|d OCLCQ
|d UAB
|d OL$
|d BOL
|d UKCRE
|d UKUSR
|d OCLCQ
|d OCLCO
|d OCLCQ
|d INARC
|d QGK
|d OCLCO
|
015 |
|
|
|a GBA798128
|2 bnb
|
016 |
7 |
|
|z 014459232
|2 Uk
|
019 |
|
|
|a 228148158
|a 319430950
|a 647691400
|a 916415244
|a 961595877
|a 962700657
|a 982687494
|a 984814929
|a 988417375
|a 992005357
|a 1037705242
|a 1038649819
|a 1044289367
|a 1045441820
|a 1055366637
|a 1056370777
|a 1081296211
|a 1103254412
|a 1114449779
|a 1129332796
|a 1153027470
|a 1192344918
|a 1228551706
|a 1240522775
|a 1256297251
|a 1259095399
|a 1264924359
|a 1391174076
|
020 |
|
|
|a 1597492280
|
020 |
|
|
|a 9781597492287
|
020 |
|
|
|z 9781597492287
|
020 |
|
|
|a 1281096385
|
020 |
|
|
|a 9781281096388
|
020 |
|
|
|a 9786611096380
|
020 |
|
|
|a 6611096388
|
020 |
|
|
|a 0080556086
|
020 |
|
|
|a 9780080556086
|
035 |
|
|
|a (OCoLC)298780453
|z (OCoLC)228148158
|z (OCoLC)319430950
|z (OCoLC)647691400
|z (OCoLC)916415244
|z (OCoLC)961595877
|z (OCoLC)962700657
|z (OCoLC)982687494
|z (OCoLC)984814929
|z (OCoLC)988417375
|z (OCoLC)992005357
|z (OCoLC)1037705242
|z (OCoLC)1038649819
|z (OCoLC)1044289367
|z (OCoLC)1045441820
|z (OCoLC)1055366637
|z (OCoLC)1056370777
|z (OCoLC)1081296211
|z (OCoLC)1103254412
|z (OCoLC)1114449779
|z (OCoLC)1129332796
|z (OCoLC)1153027470
|z (OCoLC)1192344918
|z (OCoLC)1228551706
|z (OCoLC)1240522775
|z (OCoLC)1256297251
|z (OCoLC)1259095399
|z (OCoLC)1264924359
|z (OCoLC)1391174076
|
050 |
|
4 |
|a HV6773
|b .B47 2007eb
|
082 |
0 |
4 |
|a 363.259/68
|2 22
|
245 |
0 |
4 |
|a The best damn cybercrime and digital forensics book period /
|c Kevin Cardwell [and others].
|
260 |
|
|
|a Burlington, Mass. :
|b Syngres,
|c �2007.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
340 |
|
|
|g polychrome.
|2 rdacc
|0 http://rdaregistry.info/termList/RDAColourContent/1003
|
347 |
|
|
|a data file
|
505 |
0 |
|
|a Ch. 1. Computer forensics in today's world -- Ch. 2. Digital forensics: an overview -- Ch. 3. Developing an enterprise digital investigative/electronic discovery capability -- Ch. 4. Integrating a quality assurance program in a digital forensic laboratory -- Ch. 5. Balancing e-discovery challenges with legal and IT requirements -- Ch. 6. Forensic software and hardware -- Ch. 7. Incident response: live forensics and investigations -- Ch. 8. Seizure of digital information -- Ch. 9. Conducting cyber investigations -- Ch. 10. Acquiring data, duplicating data, and recovering deleted files -- Ch. 11. Forensic disovery and analysis using BackTrack -- Ch. 12. Windows, Linux, and Macintosh boot processes -- Ch. 13. Windows and Linux forensics -- Ch. 14. Investigating network traffic and investigating logs -- Ch. 15. Router forensics and network forensics -- Ch. 16. Investigating wireless attacks -- Ch. 17. E-mail forensics -- Ch. 18. Steganography and application password crackers -- Ch. 19. PDA and Blackberry -- Ch. 20. MP3 forensics.
|
520 |
|
|
|a Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab. * Digital investigation and forensics is a growing industry * Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery * Appeals to law enforcement agencies with limited budgets.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Electronic discovery (Law)
|
650 |
|
6 |
|a Criminalit�e informatique
|x Enqu�etes.
|0 (CaQQLa)201-0278229
|
650 |
|
6 |
|a Communication �electronique des pi�eces.
|0 (CaQQLa)000258925
|
650 |
|
7 |
|a Computer crimes
|x Investigation.
|2 blmlsh
|
650 |
|
7 |
|a Electronic discovery (Law)
|2 blmlsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|0 (OCoLC)fst00872065
|
650 |
|
7 |
|a Electronic discovery (Law)
|2 fast
|0 (OCoLC)fst01737821
|
700 |
1 |
|
|a Cardwell, Kevin.
|4 aut
|
776 |
0 |
8 |
|i Print version:
|a Cardwell, Kevin.
|t Best damn cybercrime and digital forensics book period.
|d Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2007
|w (DLC) 2008295064
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597492287
|z Texto completo
|