|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
SCIDIR_ocn929448540 |
003 |
OCoLC |
005 |
20231120112034.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
151116s2016 mau ob 001 0 eng d |
010 |
|
|
|a 2015952961
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d IDEBK
|d N$T
|d YDXCP
|d OCLCF
|d UMI
|d CDX
|d UIU
|d B24X7
|d STF
|d DEBSZ
|d COO
|d D6H
|d DEBBG
|d OTZ
|d VT2
|d Z5A
|d VGM
|d LIV
|d OCLCQ
|d U3W
|d CEF
|d EZ9
|d OCLCQ
|d WYU
|d LQU
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 930332985
|a 932322873
|a 985065291
|a 1005810099
|a 1008957982
|a 1066413828
|a 1103252153
|a 1105176544
|a 1105572870
|a 1129349368
|a 1152991595
|a 1192337153
|a 1235824160
|a 1240528208
|a 1262685795
|
020 |
|
|
|a 9780128019634
|q (electronic bk.)
|
020 |
|
|
|a 0128019638
|q (electronic bk.)
|
020 |
|
|
|z 9780128019498
|
020 |
|
|
|z 0128019492
|
035 |
|
|
|a (OCoLC)929448540
|z (OCoLC)930332985
|z (OCoLC)932322873
|z (OCoLC)985065291
|z (OCoLC)1005810099
|z (OCoLC)1008957982
|z (OCoLC)1066413828
|z (OCoLC)1103252153
|z (OCoLC)1105176544
|z (OCoLC)1105572870
|z (OCoLC)1129349368
|z (OCoLC)1152991595
|z (OCoLC)1192337153
|z (OCoLC)1235824160
|z (OCoLC)1240528208
|z (OCoLC)1262685795
|
050 |
|
4 |
|a QA76.77
|b .M47 2016eb
|
072 |
|
7 |
|a COM
|x 046000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.4/3
|2 23
|
100 |
1 |
|
|a Messier, Ric,
|e author.
|
245 |
1 |
0 |
|a Operating system forensics /
|c Ric Messier ; Kevin Mackay, technical editor.
|
264 |
|
1 |
|a Waltham, MA :
|b Elsevier :
|b Syngress,
|c [2016]
|
300 |
|
|
|a 1 online resource (vii, 374 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This book covers all three critical operating systems for digital forensic investigations. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered. It walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. Technical topics include: Windows Registry, /etc directory, web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. --
|c Edited summary from book.
|
505 |
0 |
|
|a Forensics and operating systems -- File systems -- Data and file recovery -- Memory forensics -- System configuration -- Web browsing -- Tracking artifacts -- Log files -- Executable programs -- Malware -- Mobile operating systems -- Newer technologies -- Reporting.
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
6 |
|a Syst�emes d'exploitation (Ordinateurs)
|0 (CaQQLa)201-0029698
|
650 |
|
7 |
|a operating systems.
|2 aat
|0 (CStmoGRI)aat300235851
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|0 (OCoLC)fst01046280
|
776 |
0 |
8 |
|i Print version:
|a Messier, Ric.
|t Operating system forensics.
|d Waltham, MA : Elsevier : Syngress, [2016]
|z 9780128019498
|z 0128019492
|w (OCoLC)907182674
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128019498
|z Texto completo
|