MARC details
000 -LEADER |
fixed length control field |
02596nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520100608.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780123742681 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV 6773 .C37 2011 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Casey, Eoghan |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Digital evidence and computer crime : |
Remainder of title |
forensic science, computers and the internet / |
Statement of responsibility, etc. |
Eoghan Casey |
250 ## - EDITION STATEMENT |
Edition statement |
THIRD EDITION. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Waltham, MA : |
Name of publisher, distributor, etc. |
Academic Press, |
Date of publication, distribution, etc. |
c2011 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvii, 807 pages : |
Other physical details |
illustrations, maps ; |
Dimensions |
25 cm. |
365 ## - TRADE PRICE |
Price amount |
USD37.63 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foundations of digital forensics -- Language of computer crimes -- Digital evidence in the courtroom -- Cybercrime law: a United States perspective -- Cybercrime law: a European perspective -- Conducting digital investigations -- Handling a digital crime scene -- Investigative reconstruction with digital evidence -- Modus operandi, motive, and technology -- Violent crime and digital evidence -- Digital evidence as alibi -- Sex offenders on the Internet -- Computer intrusions -- Cyberstalking -- Computer basics for digital investigators -- Applying forensic science to computers -- DIgital evidence on Windows systems -- Digital evidence on UNIX systems -- Digital evidence on Macintosh systems -- Digital evidence on mobile devices -- Network basics for digital investigators -- Applying forensic science to networks -- DIgital evidence on the Internet -- DIgital evidence on physical and data-link layers -- Digital evidence at the network and transport layers. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The textbook teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Additionally, this third edition includes updated chapters dedicated to networked Windows, Unix, and Macintosh computers, and Personal Digital Assistants. Ancillary materials include an Instructor's Manual and PowerPoint slides. -- Product Description. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER CRIMES -- INVESTIGATIONS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |