|
|
|
|
| LEADER |
00000cam a22000004a 4500 |
| 001 |
OR_ocm61363643 |
| 003 |
OCoLC |
| 005 |
20231017213018.0 |
| 006 |
m o d |
| 007 |
cr cnu---unuuu |
| 008 |
050828s2005 flua obf 001 0 eng d |
| 040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d IDEBK
|d OCLCQ
|d TUU
|d OCLCQ
|d COCUF
|d CUS
|d UV0
|d E7B
|d MHW
|d TULIB
|d EBLCP
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d CRCPR
|d OCLCQ
|d VVJ
|d BAKER
|d TEFOD
|d OCL
|d OCLCQ
|d PIFBY
|d OTZ
|d TYFRS
|d MERUC
|d UAB
|d WY@
|d LUE
|d KIJ
|d D6H
|d OCLCQ
|d CEF
|d NLE
|d OCLCQ
|d UKMGB
|d UWO
|d YDX
|d OCLCQ
|d LEAUB
|d UKAHL
|d OCLCQ
|d ERF
|d OCLCQ
|d VT2
|d K6U
|d OCLCO
|d OCLCA
|d OCLCO
|d FZL
|d OCLCQ
|d OCLCO
|
| 016 |
7 |
|
|a 018428332
|2 Uk
|
| 019 |
|
|
|a 61280472
|a 61503905
|a 66902239
|a 149636367
|a 171128269
|a 183428829
|a 228113628
|a 264461146
|a 648241650
|a 681149215
|a 712976116
|a 779915989
|a 992099843
|a 994756054
|a 1000435260
|a 1027310105
|a 1029502049
|a 1069599408
|a 1086943499
|a 1152975946
|a 1192338077
|a 1240514479
|a 1337380103
|a 1351595325
|
| 020 |
|
|
|a 0203005236
|q (electronic bk.)
|
| 020 |
|
|
|a 9780203005231
|q (electronic bk.)
|
| 020 |
|
|
|a 9781420031324
|
| 020 |
|
|
|a 1420031325
|
| 020 |
|
|
|a 0849327687
|
| 020 |
|
|
|a 9780849327681
|
| 020 |
|
|
|a 9781138415447
|
| 020 |
|
|
|a 1138415448
|
| 020 |
|
|
|a 9786610164400
|
| 020 |
|
|
|a 6610164401
|
| 020 |
|
|
|z 9781466536678
|
| 020 |
|
|
|z 1466536675
|
| 020 |
|
|
|z 0429074816
|
| 020 |
|
|
|z 9780429074813
|
| 024 |
8 |
|
|a AUE2768
|
| 024 |
8 |
|
|a KE75700
|
| 024 |
8 |
|
|a 9781420031324
|
| 029 |
1 |
|
|a AU@
|b 000050892986
|
| 029 |
1 |
|
|a AU@
|b 000066971706
|
| 029 |
1 |
|
|a DEBSZ
|b 405681534
|
| 029 |
1 |
|
|a DEBSZ
|b 430269498
|
| 029 |
1 |
|
|a DEBSZ
|b 449063992
|
| 029 |
1 |
|
|a NZ1
|b 12020096
|
| 029 |
1 |
|
|a NZ1
|b 13338316
|
| 029 |
1 |
|
|a UKMGB
|b 018428332
|
| 035 |
|
|
|a (OCoLC)61363643
|z (OCoLC)61280472
|z (OCoLC)61503905
|z (OCoLC)66902239
|z (OCoLC)149636367
|z (OCoLC)171128269
|z (OCoLC)183428829
|z (OCoLC)228113628
|z (OCoLC)264461146
|z (OCoLC)648241650
|z (OCoLC)681149215
|z (OCoLC)712976116
|z (OCoLC)779915989
|z (OCoLC)992099843
|z (OCoLC)994756054
|z (OCoLC)1000435260
|z (OCoLC)1027310105
|z (OCoLC)1029502049
|z (OCoLC)1069599408
|z (OCoLC)1086943499
|z (OCoLC)1152975946
|z (OCoLC)1192338077
|z (OCoLC)1240514479
|z (OCoLC)1337380103
|z (OCoLC)1351595325
|
| 037 |
|
|
|b OverDrive, Inc.
|n http://www.overdrive.com
|
| 050 |
|
4 |
|a HV8079.C65
|b M53 2005eb
|
| 072 |
|
7 |
|a LAW
|x 041000
|2 bisacsh
|
| 082 |
0 |
4 |
|a 363.25/968
|2 22
|
| 049 |
|
|
|a UAMI
|
| 100 |
1 |
|
|a Middleton, Bruce.
|
| 245 |
1 |
0 |
|a Cyber crime investigator's field guide /
|c Bruce Middleton.
|
| 246 |
3 |
|
|a Cybercrime investigator's field guide
|
| 250 |
|
|
|a 2nd ed.
|
| 260 |
|
|
|a Boca Raton :
|b Auerbach Publications,
|c ©2005.
|
| 300 |
|
|
|a 1 online resource (xiv, 279 pages) :
|b illustrations
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|
| 500 |
|
|
|a Includes index.
|
| 504 |
|
|
|a Includes bibliographical references and index.
|
| 588 |
0 |
|
|a Print version record.
|
| 505 |
0 |
|
|a Book Cover; Title; Copyright; Contents; About The Author; Preface; Chapter 1 The Initial Contact; Chapter 2 Client Site Arrival; Chapter 3 Evidence Collection Procedures; Chapter 4 Evidence Collection And Analysis Tools; Chapter 5 Accessdata's Forensic Tool Kit; Chapter 6 Guidance Software's Encase; Chapter 7 Ilook Investigator; Chapter 8 Password Recovery; Chapter 9 Questions And Answers By Subject Area; Chapter 10 Recommended Reference Materials; Chapter 11 Case Study; Appendix A Glossary; Appendix B Port Numbers Used By Malicious Trojan Horse Programs; Appendix C Attack Signatures.
|
| 520 |
|
|
|a The movement toward miniaturized and mobile computing has created more opportunity for cyber thieves. To respond effectively, IT security professionals need a resource that combines the understanding of investigative techniques with the technical knowledge of cyberspace. Cyber Crime Investigator's Field Guide, Second Edition provides an investigative framework, demonstrates the knowledge of how cyberspace really works, and explains the tools needed to pursue cyber criminals. This volume provides the details of investigating computer crime from soup to nuts. It covers the entire investigative p.
|
| 542 |
|
|
|f Copyright © Auerbach Publications 2005
|g 2005
|
| 590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
| 650 |
|
0 |
|a Computer crimes
|x Investigation
|v Handbooks, manuals, etc.
|
| 650 |
|
6 |
|a Criminalité informatique
|x Enquêtes
|v Guides, manuels, etc.
|
| 650 |
|
7 |
|a LAW
|x Forensic Science.
|2 bisacsh
|
| 650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
| 655 |
|
7 |
|a handbooks.
|2 aat
|
| 655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
| 655 |
|
7 |
|a Handbooks and manuals.
|2 lcgft
|
| 655 |
|
7 |
|a Guides et manuels.
|2 rvmgf
|
| 776 |
0 |
8 |
|i Print version:
|a Middleton, Bruce.
|t Cyber crime investigator's field guide.
|b 2nd ed.
|d Boca Raton : Auerbach Publications, ©2005
|z 0849327687
|w (DLC) 2004046396
|w (OCoLC)56194699
|
| 856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781420031324/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
| 938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH19671428
|
| 938 |
|
|
|a Baker & Taylor
|b BKTY
|c 69.95
|d 69.95
|i 0849327687
|n 0006086822
|s active
|
| 938 |
|
|
|a CRC Press
|b CRCP
|n AUP0AUE2768PDF
|
| 938 |
|
|
|a EBSCOhost
|b EBSC
|n 115449
|
| 938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429078804
|
| 938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780203005231
|
| 938 |
|
|
|a YBP Library Services
|b YANK
|n 15916042
|
| 938 |
|
|
|a YBP Library Services
|b YANK
|n 2594104
|
| 938 |
|
|
|a YBP Library Services
|b YANK
|n 2279211
|
| 994 |
|
|
|a 92
|b IZTAP
|