Investigative computer forensics : (Record no. 9241)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01764nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100613.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780470932407 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV 8079.C65 .L39 2013 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Laykin, Erik |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Investigative computer forensics : |
Remainder of title | the practical guide for lawyers, accountants, investigators, and business executives / |
Statement of responsibility, etc. | Erik Laykin |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Chichester, England : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | c2013 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvii, 222 pages : |
Other physical details | illustrations ; |
Dimensions | 25 cm. |
365 ## - TRADE PRICE | |
Price amount | PHP6371 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction: Investigative Computer Forensics -- Chapter 1: The Glue -- Chapter 2: A Primer on Computers and Networks -- Chapter 3: Computer Forensic Fundamentals -- Chapter 4: Investigative Fundamentals -- Chapter 5: The Underpinnings of Investigative Computer Forensics -- Chapter 6: Tactical Objectives and Challenges in Investigative Computer Forensics -- Chapter 7: The Cyber-Firefighters -- Chapter 8: E-Discovery Responsibilities -- Chapter 9: The future. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both dome. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER CRIMES -- INVESTIGATION |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 03/26/2014 | Purchased - F & J De Jesus, Inc. | 6371.00 | GC HV 8079.C65 .L39 2013 | NULIB000007000 | 05/20/2025 | c.1 | 05/20/2025 | Books |