Guide to computer forensics and investigations / (Record no. 8972)

MARC details
000 -LEADER
fixed length control field 01959nam a2200253Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520100608.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781435498839
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV 8079.C65 .N45 2010
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Nelson, Bill
Relator term author
245 #0 - TITLE STATEMENT
Title Guide to computer forensics and investigations /
Statement of responsibility, etc. Bill Nelson, Amelia Phillips and Christopher Steuart
250 ## - EDITION STATEMENT
Edition statement Fourth edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Australia :
Name of publisher, distributor, etc. Cengage Learning Asia Pte Ltd,
Date of publication, distribution, etc. c2010
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 682 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD86.41
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Computer Forensics and Investigation Processes -- Chapter 2: Understanding Computing Investigations -- Chapter 3: The Investigator's Office and Laboratory -- Chapter 4: Data Acquisitions -- Chapter 5: Processing Crime and Incident Scenes -- Chapter 6: Working with Windows and DOS Systems -- Chapter 7: Current Computer Forensics Tools -- Chapter 8: Macintosh and Linux Boot Processes and File Systems -- Chapter 9: Computer Forensics Analysis -- Chapter 10: Recovering Graphics Files -- Chapter 11: Virtual Machines, Network Forensics, and Live Acquisitions -- Chapter 12: E-mail Investigations -- Chapter 13: Cell Phone and Mobile Device Forensics -- Chapter 14: Report Writing for High-Tech Investigations -- Chapter 15: Expert Testimony in High-Tech Investigations -- Chapter 16: Ethics and High-Tech Investigations.
520 ## - SUMMARY, ETC.
Summary, etc. Helps learners master the skills necessary to launch and complete a successful computer investigation. This resource guides them through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. It features free downloads of the forensic software, so readers can become familiar with the tools of the trade.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Phillips, Amelia ;Steuart, Christopher
Relator term co-author;co-author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 01/27/2014 Purchased - Amazon 86.41   GC HV 8079.C65 .N45 2010 NULIB000006731 05/20/2025 c.1 05/20/2025 Books