Computer forensics : (Record no. 8963)

MARC details
000 -LEADER
fixed length control field 01995nam a2200229Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520100607.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071742450
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV 8079.C65 .C69 2013
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Cowen, David
Relator term author
245 #0 - TITLE STATEMENT
Title Computer forensics :
Remainder of title infosec pro guide /
Statement of responsibility, etc. David Cowen
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw Hill Education,
Date of publication, distribution, etc. c2013
300 ## - PHYSICAL DESCRIPTION
Extent xxviii, 512 pages :
Other physical details illustrations ;
Dimensions 23 cm.
365 ## - TRADE PRICE
Price amount USD29.56
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note PART I: Getting Started -- 1: What Is Computer Forensics? -- 2: Learning Computer Forensics -- 3: Creating a Lab -- PART II: Your First Investigation -- 4: How to Approach a Computer Forensics Investigation -- 5: Choosing Your Procedures -- 6: Testing Your Tools -- 7: Live vs. Postmortem Forensics -- 8: Capturing Evidence -- 9: Nontraditional Digital Forensics -- PART III: Case Examples: How to Work a Case -- 10: Establishing the Investigation Type and Criteria -- 11: Human Resources Cases -- 12: Administrator Abuse -- 13: Stealing Information -- 14: Internal Leaks --15: Keyloggers and Malware -- PART IV: Defining your work -- 16: Documenting Your Findings with Reports -- 17: Litigation and Reports for Court and Exhibits.
520 ## - SUMMARY, ETC.
Summary, etc. Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources,
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER CRIMES -- INVESTIGATION
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 01/27/2014 Purchased - Amazon 29.56   GC HV 8079.C65 .C69 2013 NULIB000006722 05/20/2025 c.1 05/20/2025 Books