Cargando...

Computer forensics jumpstart /

A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools.

Detalles Bibliográficos
Main Authors: Solomon, Michael (Michael G.), 1963- (Author), Rudolph, K (Author), Tittel, Ed (Author), Broom, Neil (Author), Barrett, Diane (Author)
Formato: Printed Book
Idioma:English
Publicado: Indianapolis, Indiana : Wiley Publishing, Inc. [2011], ©2011.
Edición:Second edition.
Subjects:
Acceso en liña:Contributor biographical information
Publisher description
Table of contents only
LEADER 02836cam a2200529 i 4500
001 16965835
003 inmpuc
005 20201023102947.0
008 110916t20112011inua b 001 0 eng d
010 |a  2011288103 
020 |a 9780470931660 
020 |a 0470931663 
020 |z 9781118067574 (ebk.) 
020 |z 9781118067659 (ebk.) 
020 |z 9781118067642 (ebk.) 
035 |a (OCoLC)ocn664666895 
040 |a BTCTA  |b eng  |c BTCTA  |d YDXCP  |d IVJ  |d BWX  |e rda  |d ORX  |d DLC 
042 |a lccopycat 
082 0 4 |a 005.8  |2 23 
100 1 |a Solomon, Michael  |q (Michael G.),  |d 1963-  |e author. 
245 1 0 |a Computer forensics jumpstart /  |c Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett. 
246 3 0 |a JumpStart 
250 |a Second edition. 
260 |a Indianapolis, Indiana :  |b Wiley Publishing, Inc.  |c [2011], ©2011. 
300 |a xx, 316 pages :  |b illustrations ;  |c 24 cm 
504 |a Includes bibliographical references and index. 
505 0 |a The need for computer forensics -- Preparation--what to do before you start -- Computer evidence -- Common tasks -- Capturing the data image -- Extracting information from data -- Passwords and encryption -- Common forensics tools -- Pulling it all together -- How to testify in court -- Appendix A: answers to review questions -- Appendix B: forensics resources -- Appendix C: forensics certifications -- Appendix D: forensics tools. 
520 |a A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes  |x Accidents  |x Investigation. 
650 0 |a Forensic sciences. 
650 7 |a Computer security.  |2 sears 
650 7 |a Computer networks  |x Security measures.  |2 sears 
650 7 |a Forensic sciences.  |2 sears 
700 1 |a Rudolph, K,  |e author. 
700 1 |a Tittel, Ed,  |e author. 
700 1 |a Broom, Neil,  |e author. 
700 1 |a Barrett, Diane,  |e author. 
856 4 2 |3 Contributor biographical information  |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-b.html 
856 4 2 |3 Publisher description  |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-d.html 
856 4 1 |3 Table of contents only  |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-t.html 
906 |a 7  |b cbc  |c copycat  |d 2  |e ncip  |f 20  |g y-gencatlg 
942 |2 ddc  |c BK 
955 |b xh06 2011-09-16 z-processor to STM  |a xh00 2011-09-22 to USPL/STM  |a xh10 2011-10-27 to rda shelf in LM551  |a pa20 2012-04-10 
999 |c 353450  |d 353450 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_SOL_C  |7 0  |9 408887  |a DCS  |b DCS  |c ST1  |d 2020-10-23  |i 586  |l 0  |o 005.8 SOL/C  |p DCS586  |r 2020-10-23  |w 2020-10-23  |y BK