Computer forensics : (Record no. 8963)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01995nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100607.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071742450 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV 8079.C65 .C69 2013 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Cowen, David |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Computer forensics : |
Remainder of title | infosec pro guide / |
Statement of responsibility, etc. | David Cowen |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New York : |
Name of publisher, distributor, etc. | McGraw Hill Education, |
Date of publication, distribution, etc. | c2013 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxviii, 512 pages : |
Other physical details | illustrations ; |
Dimensions | 23 cm. |
365 ## - TRADE PRICE | |
Price amount | USD29.56 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | PART I: Getting Started -- 1: What Is Computer Forensics? -- 2: Learning Computer Forensics -- 3: Creating a Lab -- PART II: Your First Investigation -- 4: How to Approach a Computer Forensics Investigation -- 5: Choosing Your Procedures -- 6: Testing Your Tools -- 7: Live vs. Postmortem Forensics -- 8: Capturing Evidence -- 9: Nontraditional Digital Forensics -- PART III: Case Examples: How to Work a Case -- 10: Establishing the Investigation Type and Criteria -- 11: Human Resources Cases -- 12: Administrator Abuse -- 13: Stealing Information -- 14: Internal Leaks --15: Keyloggers and Malware -- PART IV: Defining your work -- 16: Documenting Your Findings with Reports -- 17: Litigation and Reports for Court and Exhibits. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from different sources, |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER CRIMES -- INVESTIGATION |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 01/27/2014 | Purchased - Amazon | 29.56 | GC HV 8079.C65 .C69 2013 | NULIB000006722 | 05/20/2025 | c.1 | 05/20/2025 | Books |