|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn608327068 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr un||||a|a|| |
008 |
100420s2001 maua ob 001 0 eng d |
040 |
|
|
|a OCLCE
|b eng
|e pn
|c OCLCE
|d OCLCQ
|d UMI
|d HEBIS
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCF
|d IDEBK
|d OCLCQ
|d YDX
|d OCLCQ
|d OCLCA
|d KIJ
|d CEF
|d AU@
|d WYU
|d OCLCQ
|d VT2
|d UAB
|d OCLCQ
|d OCLCO
|d UKOBU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 606586746
|a 738406399
|a 1027323083
|a 1044602036
|a 1056445089
|a 1058906230
|a 1060868042
|a 1062897346
|a 1073047418
|a 1083237105
|a 1097149420
|a 1202542005
|a 1240518110
|
020 |
|
|
|a 9780672333989
|
020 |
|
|
|a 0672333988
|
020 |
|
|
|a 9781282692022
|
020 |
|
|
|a 128269202X
|
020 |
|
|
|a 9786612692024
|
020 |
|
|
|a 6612692022
|
020 |
|
|
|z 0201707195
|
020 |
|
|
|z 9780201707199
|
029 |
1 |
|
|a AU@
|b 000067114029
|
029 |
1 |
|
|a DEBSZ
|b 368470423
|
029 |
1 |
|
|a GBVCP
|b 672798301
|
029 |
1 |
|
|a HEBIS
|b 291537553
|
029 |
1 |
|
|a AU@
|b 000057226537
|
035 |
|
|
|a (OCoLC)608327068
|z (OCoLC)606586746
|z (OCoLC)738406399
|z (OCoLC)1027323083
|z (OCoLC)1044602036
|z (OCoLC)1056445089
|z (OCoLC)1058906230
|z (OCoLC)1060868042
|z (OCoLC)1062897346
|z (OCoLC)1073047418
|z (OCoLC)1083237105
|z (OCoLC)1097149420
|z (OCoLC)1202542005
|z (OCoLC)1240518110
|
037 |
|
|
|a CL0500000093
|b Safari Books Online
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b K78 2001
|
082 |
0 |
4 |
|a 005.8
|2 21
|
082 |
0 |
4 |
|a 363.25968
|2 21
|
084 |
|
|
|a 54.61
|2 bcl
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kruse, Warren G.
|
245 |
1 |
0 |
|a Computer forensics :
|b incident response essentials /
|c Warren G. Kruse II, Jay G. Heiser.
|
260 |
|
|
|a Boston, MA :
|b Addison-Wesley,
|c 2001.
|
300 |
|
|
|a 1 online resource (xiii, 392) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 381-384) and index.
|
505 |
0 |
|
|a Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system.
|
520 |
1 |
|
|a "Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--Jacket
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Forensic sciences.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Forensic Sciences
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalistique.
|
650 |
|
7 |
|a forensic science.
|2 aat
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Forensic sciences
|2 fast
|
650 |
1 |
7 |
|a Computerbeveiliging.
|2 gtt
|
650 |
1 |
7 |
|a Computercriminaliteit.
|2 gtt
|
650 |
1 |
7 |
|a Gerechtelijke technologie.
|2 gtt
|
700 |
1 |
|
|a Heiser, Jay G.
|
776 |
0 |
8 |
|i Print version:
|a Kruse, Warren G.
|t Computer forensics.
|d Boston, MA : Addison-Wesley, 2001
|w (DLC) 2001034106
|w (OCoLC)47098296
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780672333989/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis23979022
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14857092
|
994 |
|
|
|a 92
|b IZTAP
|