Digital forensics explained / (Record no. 21780)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01804nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520103029.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780367503437 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV 8079.C65 .D54 2021 |
245 #0 - TITLE STATEMENT | |
Title | Digital forensics explained / |
Statement of responsibility, etc. | Edited by Greg Gogolin |
250 ## - EDITION STATEMENT | |
Edition statement | Second Edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton, Florida : |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | c2021 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xx, 234 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD51 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. What is digital forensics, and what should you know about it? -- 2. Digital forensic approaches and best practices -- 3. Digital forensics tool kit -- 4. Internet and e-mail examinations -- 5. Mobile forensics -- 6. Cloud computing and digital forensics -- 7. Law enforcement incident response -- 8. Report writing and presentation -- 9. Social media forensics -- 10. Social engineering forensics -- 11. Anti-forensics -- 12. Link and visual analysis -- 13. Psychological, ethical, and cultural implications of digital forensics -- 14. Someone is watching -- 15. The realities of digital forensic practice. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Gogolin, Greg |
Relator term | editor |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Computer Science | LRC - Main | National University - Manila | General Circulation | 05/07/2024 | Purchased - Amazon | 51.00 | GC HV 8079.C65 .D54 2021 | NULIB000019539 | 05/20/2025 | c.1 | 05/20/2025 | Books |