Digital forensics explained / (Record no. 21780)

MARC details
000 -LEADER
fixed length control field 01804nam a2200241Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520103029.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367503437
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV 8079.C65 .D54 2021
245 #0 - TITLE STATEMENT
Title Digital forensics explained /
Statement of responsibility, etc. Edited by Greg Gogolin
250 ## - EDITION STATEMENT
Edition statement Second Edition
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton, Florida :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. c2021
300 ## - PHYSICAL DESCRIPTION
Extent xx, 234 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD51
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. What is digital forensics, and what should you know about it? -- 2. Digital forensic approaches and best practices -- 3. Digital forensics tool kit -- 4. Internet and e-mail examinations -- 5. Mobile forensics -- 6. Cloud computing and digital forensics -- 7. Law enforcement incident response -- 8. Report writing and presentation -- 9. Social media forensics -- 10. Social engineering forensics -- 11. Anti-forensics -- 12. Link and visual analysis -- 13. Psychological, ethical, and cultural implications of digital forensics -- 14. Someone is watching -- 15. The realities of digital forensic practice.
520 ## - SUMMARY, ETC.
Summary, etc. Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Gogolin, Greg
Relator term editor
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Computer Science LRC - Main National University - Manila General Circulation 05/07/2024 Purchased - Amazon 51.00   GC HV 8079.C65 .D54 2021 NULIB000019539 05/20/2025 c.1 05/20/2025 Books