Guide to computer forensics and investigations / (Record no. 8972)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01959nam a2200253Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100608.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781435498839 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV 8079.C65 .N45 2010 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Nelson, Bill |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Guide to computer forensics and investigations / |
Statement of responsibility, etc. | Bill Nelson, Amelia Phillips and Christopher Steuart |
250 ## - EDITION STATEMENT | |
Edition statement | Fourth edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Australia : |
Name of publisher, distributor, etc. | Cengage Learning Asia Pte Ltd, |
Date of publication, distribution, etc. | c2010 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxv, 682 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD86.41 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1: Computer Forensics and Investigation Processes -- Chapter 2: Understanding Computing Investigations -- Chapter 3: The Investigator's Office and Laboratory -- Chapter 4: Data Acquisitions -- Chapter 5: Processing Crime and Incident Scenes -- Chapter 6: Working with Windows and DOS Systems -- Chapter 7: Current Computer Forensics Tools -- Chapter 8: Macintosh and Linux Boot Processes and File Systems -- Chapter 9: Computer Forensics Analysis -- Chapter 10: Recovering Graphics Files -- Chapter 11: Virtual Machines, Network Forensics, and Live Acquisitions -- Chapter 12: E-mail Investigations -- Chapter 13: Cell Phone and Mobile Device Forensics -- Chapter 14: Report Writing for High-Tech Investigations -- Chapter 15: Expert Testimony in High-Tech Investigations -- Chapter 16: Ethics and High-Tech Investigations. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Helps learners master the skills necessary to launch and complete a successful computer investigation. This resource guides them through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. It features free downloads of the forensic software, so readers can become familiar with the tools of the trade. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Phillips, Amelia ;Steuart, Christopher |
Relator term | co-author;co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 01/27/2014 | Purchased - Amazon | 86.41 | GC HV 8079.C65 .N45 2010 | NULIB000006731 | 05/20/2025 | c.1 | 05/20/2025 | Books |