|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn899606847 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150108s2015 inua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d S4S
|d DEBBG
|d C6I
|d YDX
|d OCLCA
|d CEF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9780132756174
|
020 |
|
|
|a 013275617X
|
020 |
|
|
|z 9780789741158
|
020 |
|
|
|z 0789741156
|
029 |
1 |
|
|a DEBBG
|b BV042490446
|
029 |
1 |
|
|a DEBSZ
|b 434836257
|
029 |
1 |
|
|a GBVCP
|b 882738577
|
035 |
|
|
|a (OCoLC)899606847
|
037 |
|
|
|a CL0500000525
|b Safari Books Online
|
050 |
|
4 |
|a HV8079.C65
|
082 |
0 |
4 |
|a 364.168
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hayes, Darren R.,
|e author.
|
245 |
1 |
2 |
|a A practical guide to computer forensics investigations /
|c Dr. Darren R. Hayes.
|
264 |
|
1 |
|a Indianapolis, Indiana :
|b Pearson,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed January 5, 2015).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
8 |
|
|a Annotation
|b All you need to know to succeed in digital forensics: technical and investigative skills, in one bookComplete, practical, and up-to-dateThoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networksAddresses online and lab investigations, documentation, admissibility, and moreBy Dr. Darren Hayes, founder of Pace University's Code Detectives forensics lab-one of America's "Top 10 Computer Forensics Professors"Perfect for anyone pursuing a digital forensics career or working with examinersCriminals go where the money is. Today, trillions of dollars of assets are digital, and digital crime is growing fast. In response, demand for digital forensics experts is soaring. To succeed in this exciting field, you need strong technical and investigative skills. In this guide, one of the world's leading computer orensics experts teaches you all the skills you'll need. Writing for students and professionals at all levels, Dr. Darren Hayes presents complete best practices for capturing and analyzing evidence, protecting the chain of custody, documenting investigations, and scrupulously adhering to the law, so your evidence can always be used. Hayes introduces today's latest technologies and technical challenges, offering detailed coverage of crucial topics such as mobile forensics, Mac forensics, cyberbullying, and child endangerment. This guide's practical activities and case studies give you hands-on mastery of modern digital forensics tools and techniques. Its many realistic examples reflect the author's extensive and pioneering work as a forensics examiner in both criminal and civil investigations. Understand what computer forensics examiners do, and the types of digital evidence they work withExplore Windows and Mac computers, understand how their features affect evidence gathering, and use free tools to investigate their contentsExtract data from diverse storage devicesEstablish a certified forensics lab and implement good practices for managing and processing evidenceGather data and perform investigations onlineCapture Internet communications, video, images, and other contentWrite comprehensive reports that withstand defense objections and enable successful prosecutionFollow strict search and surveillance rules to make your evidence admissibleInvestigate network breaches, including dangerous Advanced Persistent Threats (APTs)Retrieve immense amounts of evidence from smartphones, even without seizing themSuccessfully investigate financial fraud performed with digital devicesUse digital photographic evidence, including metadata and social media images.
|
505 |
0 |
|
|a Machine generated contents note: Introduction -- Popular Myths about Computer Forensics -- Types of Computer Forensics Evidence Recovered -- Electronic Mail (Email) -- Images -- Video -- Websites Visited and Internet Searches -- Cellphone Forensics -- What Skills Must a Computer Forensics Investigator Possess? -- Computer Science Knowledge -- Legal Expertise -- Communication Skills -- Linguistic Abilities -- Continuous Learning -- An Appreciation for Confidentiality -- The Importance of Computer Forensics -- Job Opportunities -- A History of Computer Forensics -- 1980's: The Advent of the Personal Computer -- 1990's: The Impact of the Internet -- Training and Education -- Law Enforcement Training -- Summary -- Introduction -- Physical and Logical Storage -- File Storage -- File Conversion and Numbering Formats -- Conversion of Binary to Decimal -- Hexadecimal Numbering -- Conversion of Hexadecimal to Decimal.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780132756174/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14854523
|
994 |
|
|
|a 92
|b IZTAP
|