Cargando...
Computer forensics jumpstart /
A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools.
| Main Authors: | , , , , |
|---|---|
| Formato: | Printed Book |
| Idioma: | English |
| Publicado: |
Indianapolis, Indiana :
Wiley Publishing, Inc.
[2011], ©2011.
|
| Edición: | Second edition. |
| Subjects: | |
| Acceso en liña: | Contributor biographical information Publisher description Table of contents only |
| LEADER | 02836cam a2200529 i 4500 | ||
|---|---|---|---|
| 001 | 16965835 | ||
| 003 | inmpuc | ||
| 005 | 20201023102947.0 | ||
| 008 | 110916t20112011inua b 001 0 eng d | ||
| 010 | |a 2011288103 | ||
| 020 | |a 9780470931660 | ||
| 020 | |a 0470931663 | ||
| 020 | |z 9781118067574 (ebk.) | ||
| 020 | |z 9781118067659 (ebk.) | ||
| 020 | |z 9781118067642 (ebk.) | ||
| 035 | |a (OCoLC)ocn664666895 | ||
| 040 | |a BTCTA |b eng |c BTCTA |d YDXCP |d IVJ |d BWX |e rda |d ORX |d DLC | ||
| 042 | |a lccopycat | ||
| 082 | 0 | 4 | |a 005.8 |2 23 |
| 100 | 1 | |a Solomon, Michael |q (Michael G.), |d 1963- |e author. | |
| 245 | 1 | 0 | |a Computer forensics jumpstart / |c Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett. |
| 246 | 3 | 0 | |a JumpStart |
| 250 | |a Second edition. | ||
| 260 | |a Indianapolis, Indiana : |b Wiley Publishing, Inc. |c [2011], ©2011. | ||
| 300 | |a xx, 316 pages : |b illustrations ; |c 24 cm | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a The need for computer forensics -- Preparation--what to do before you start -- Computer evidence -- Common tasks -- Capturing the data image -- Extracting information from data -- Passwords and encryption -- Common forensics tools -- Pulling it all together -- How to testify in court -- Appendix A: answers to review questions -- Appendix B: forensics resources -- Appendix C: forensics certifications -- Appendix D: forensics tools. | |
| 520 | |a A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools. | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Computer networks |x Security measures. | |
| 650 | 0 | |a Computer crimes |x Accidents |x Investigation. | |
| 650 | 0 | |a Forensic sciences. | |
| 650 | 7 | |a Computer security. |2 sears | |
| 650 | 7 | |a Computer networks |x Security measures. |2 sears | |
| 650 | 7 | |a Forensic sciences. |2 sears | |
| 700 | 1 | |a Rudolph, K, |e author. | |
| 700 | 1 | |a Tittel, Ed, |e author. | |
| 700 | 1 | |a Broom, Neil, |e author. | |
| 700 | 1 | |a Barrett, Diane, |e author. | |
| 856 | 4 | 2 | |3 Contributor biographical information |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-b.html |
| 856 | 4 | 2 | |3 Publisher description |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-d.html |
| 856 | 4 | 1 | |3 Table of contents only |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-t.html |
| 906 | |a 7 |b cbc |c copycat |d 2 |e ncip |f 20 |g y-gencatlg | ||
| 942 | |2 ddc |c BK | ||
| 955 | |b xh06 2011-09-16 z-processor to STM |a xh00 2011-09-22 to USPL/STM |a xh10 2011-10-27 to rda shelf in LM551 |a pa20 2012-04-10 | ||
| 999 | |c 353450 |d 353450 | ||
| 952 | |0 0 |1 0 |2 ddc |4 0 |6 005_800000000000000_SOL_C |7 0 |9 408887 |a DCS |b DCS |c ST1 |d 2020-10-23 |i 586 |l 0 |o 005.8 SOL/C |p DCS586 |r 2020-10-23 |w 2020-10-23 |y BK | ||